Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 19:18
Static task
static1
Behavioral task
behavioral1
Sample
f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe
-
Size
253KB
-
MD5
f6b09f164d9dff2942d2977e10f0f121
-
SHA1
c7c78e6a15faeb4fc81dce878d629b3ccc0ca811
-
SHA256
f3a6e5010278054ba42e8c388598096c3d6528cd3550c60b2687c2e4bf0522c3
-
SHA512
45bc7dd718f4b1bbe2df3e6616b156eb661a40dfa34335a46f1f7f1cb396e9cb51a4970baa9c46387f02518fd5464168b9cb930bf6d2c67e186b79b620455f27
-
SSDEEP
6144:kRXdt7KzrIU2ykH2ipsPnafFlerkb3LrtoetumddZR6wkB:6z7KzrIjXnOitlt3Noer
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1368-57-0x0000000000400000-0x0000000000447000-memory.dmp modiloader_stage2 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate server.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3668 server.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 server.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\PCGWIN32.LI4 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe File created C:\Windows\server.exe f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe File opened for modification C:\Windows\server.exe f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe File opened for modification C:\Windows\PCGWIN32.LI4 server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString server.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C}\ = "4101308294" f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{097421CA-3E3E050A-5413DCD4-C5785A64}\ = 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 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{097421CA-3E3E050A-5413DCD4-C5785A64}\ = 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 server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C} f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{097421CA-3E3E050A-5413DCD4-C5785A64} server.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{097421CA-3E3E050A-5413DCD4-C5785A64}\ = 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 server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{097421CA-3E3E050A-5413DCD4-C5785A64} f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{097421CA-3E3E050A-5413DCD4-C5785A64}\ = 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 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{097421CA-3E3E050A-5413DCD4-C5785A64}\ = 7cf23712ee4d36282f5636bfdfd979b8e01f60f9975b4e42167571dcdcb838deddf9c45843f97a18e339d25f454603f10a9bb385255f7c0667c0be22caedbf68195180b89823ba7d1ce4fb6ee5b78fe11688b1d294fa8f6236ed9fd7c6f1df53c6f2e1d2dc32f9d3dc72c755de7086d7d04e7e89a7eb4e9516c30f2ab6522e0b17723e9ba7c501b37c1da5b82ca017ba0e22a9bb0c650bbc529bf5fddc9b38fd5fd8467b4fda56fd71e41c81857f2ca6555e4007bc3e18a7fdc1e737516e30f7292e5409c30cd248044f43d66ab0b590e03eb45912808d0dab14cdc06bb452908370f25fac0636de6f3876db51ba789b5d7d7818273b6ea29614400d65f4209d8db8f42512a0834a85f3a3ed1d37c4dec287aabe0b666a7f5526bfdf1906c401dc307aa35bc5fa43a2b26d9a8bbccde4ebbf35269c9179b89f58f905a31c02c745de40f98e98e846a87f112678bf5f59b9b8e3a3a5d540b3f9255ce0ba3564207f23e6a2d03372e5656f90763f9fe679ff1c66fa301ceb076d5e34392363927a3ba3221d3578dca3b8c5dc7f44e6a1ce9c3645dfe0868e8fb636d0af404985ec60ea7d0ae4eded88174a7e931975f8ec658903efe2e97a0fe596038e3276e36f5a3604af3f36661fd106075e3e39d964bf6d99e8c3978d8e08094b536690d2c97154ac43eac3469a12c5206d3dbad6cb3ccc260501da897018815a1eebb947b5198ecc65ef05323bf0f65721f50079af f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3668 1368 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe 82 PID 1368 wrote to memory of 3668 1368 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe 82 PID 1368 wrote to memory of 3668 1368 f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\server.exe"C:\Windows\server.exe" \melt "C:\Users\Admin\AppData\Local\Temp\f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5afd279379a47f1a6e050e1ca20bc0e1c
SHA11ae189143798fc1b4c23f22813a0ccdcf07460e3
SHA256dcd38e2d5e217c1e8d2fbd0bc5317e98bdb0fb4e1628b62f4f61e1469c4c261c
SHA5127f9004ccca1601ac6916e97566c877428647774c5adc56c86d0cee45cb6e8ea6d64ad0b7fd49331c9dbccd0d6e8d3aa36d0104fa7a6d10f42a47bddd87a5cc6d
-
Filesize
253KB
MD5f6b09f164d9dff2942d2977e10f0f121
SHA1c7c78e6a15faeb4fc81dce878d629b3ccc0ca811
SHA256f3a6e5010278054ba42e8c388598096c3d6528cd3550c60b2687c2e4bf0522c3
SHA51245bc7dd718f4b1bbe2df3e6616b156eb661a40dfa34335a46f1f7f1cb396e9cb51a4970baa9c46387f02518fd5464168b9cb930bf6d2c67e186b79b620455f27