Analysis
-
max time kernel
95s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe
-
Size
417KB
-
MD5
f76c87de4f88f5e997d205add85666c2
-
SHA1
f5fe7df9f8fb4c5cd7e515956d013bf7401c031b
-
SHA256
471b57e0717b74ca681b07b7a1c3db861950dde91095f81d03935e6a0c11dc84
-
SHA512
99bb6a6650ef7380ee396e0a924449c98473b336014e544940a703c6f45ebae2ede5ed67c0ec293d755b04a3321805d84315408d84c4a112438c0c889076308c
-
SSDEEP
6144:XsbF2fi5VSEQubmxcuxBMqvJiyd0YmQu2uOtys4KP1e2XKueAdpJtsb4TF5W:oIqyxcMOqv3LCSP1e2XwILW
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral2/memory/2292-0-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/2292-2-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/2292-3-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/2292-4-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/2292-15-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/5056-23-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/5056-29-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/2292-32-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral2/memory/5056-38-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2140 joice.exe 5056 joice.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\K: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\P: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\T: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\Y: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\A: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\H: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\R: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\W: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\L: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\M: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\S: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\I: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\O: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\G: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\N: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\Q: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\U: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\V: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\X: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\B: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\E: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened (read-only) \??\Z: f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened for modification C:\AutoRun.inf f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File created F:\AutoRun.inf f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened for modification F:\AutoRun.inf f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 424 set thread context of 2292 424 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 82 PID 2140 set thread context of 5056 2140 joice.exe 84 PID 5056 set thread context of 1816 5056 joice.exe 87 PID 5056 set thread context of 1600 5056 joice.exe 88 -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\joice.exe f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\joice.exe f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\_joice.exe joice.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\_joice.exe joice.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3964 1816 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joice.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434085020" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1233264916" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1229827074" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{74E1BF41-7BB4-11EF-9A03-4A4A300BA5D9} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31133633" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31133633" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1229827074" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31133633" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1600 IEXPLORE.EXE 1600 IEXPLORE.EXE 4384 IEXPLORE.EXE 4384 IEXPLORE.EXE 4384 IEXPLORE.EXE 4384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 424 wrote to memory of 2292 424 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 82 PID 424 wrote to memory of 2292 424 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 82 PID 424 wrote to memory of 2292 424 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 82 PID 424 wrote to memory of 2292 424 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 82 PID 424 wrote to memory of 2292 424 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 82 PID 2292 wrote to memory of 2140 2292 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 83 PID 2292 wrote to memory of 2140 2292 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 83 PID 2292 wrote to memory of 2140 2292 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 83 PID 2140 wrote to memory of 5056 2140 joice.exe 84 PID 2140 wrote to memory of 5056 2140 joice.exe 84 PID 2140 wrote to memory of 5056 2140 joice.exe 84 PID 2140 wrote to memory of 5056 2140 joice.exe 84 PID 2140 wrote to memory of 5056 2140 joice.exe 84 PID 2292 wrote to memory of 3704 2292 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 85 PID 2292 wrote to memory of 3704 2292 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 85 PID 2292 wrote to memory of 3704 2292 f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe 85 PID 5056 wrote to memory of 1816 5056 joice.exe 87 PID 5056 wrote to memory of 1816 5056 joice.exe 87 PID 5056 wrote to memory of 1816 5056 joice.exe 87 PID 5056 wrote to memory of 1816 5056 joice.exe 87 PID 5056 wrote to memory of 1816 5056 joice.exe 87 PID 5056 wrote to memory of 1600 5056 joice.exe 88 PID 5056 wrote to memory of 1600 5056 joice.exe 88 PID 5056 wrote to memory of 1600 5056 joice.exe 88 PID 1600 wrote to memory of 4384 1600 IEXPLORE.EXE 91 PID 1600 wrote to memory of 4384 1600 IEXPLORE.EXE 91 PID 1600 wrote to memory of 4384 1600 IEXPLORE.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f76c87de4f88f5e997d205add85666c2_JaffaCakes118.exe2⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\joice.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\joice.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\joice.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\joice.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"5⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 126⤵
- Program crash
PID:3964
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1600 CREDAT:17410 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""3⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1816 -ip 18161⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD50e3fe3478c5b7bd2a9fe8683ff7d9935
SHA1f53569fb25b189b36627f3a705ae3f5c1715570c
SHA256ae1822cffc6d780d18d045bffdf29726cf36ff2397349fc4f5a3973ab11ec3a7
SHA512b5f3d0fb856f136536476ed35fc7abca1488e5cc4a6555cfba955b9cd6b4773804ec5f6f062a14096267acd2ea0d5780692504582a03dccc4948b0e91d56b235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5bf94c1f95b86846942364d11a17851b4
SHA163700cc94ae31ecd3bb028332dcdf9a0964ed406
SHA25666481be25e3d5754ba4c58aa4cceab5cf66f4c82b3bb45d82d6980822efb075d
SHA512e7a4f19100de4abf24c3cc89e913ca1f5d81b64b6bcad8a377a4d540e45f65b805aafc0ab78c5c2ce7b6b02ad51393272d20996c5d188e4ceabc40c4b9a310cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5e9a6dbff9ce978d8dad00631f14b537c
SHA113654d97d47f8da5c485ac525f0e2ec8fecbb7ad
SHA256a841c3b6191da225f34dd2b85da5167d0c9ace552f5b534b8514631d51c19082
SHA5129bf8c910a8b20a3976d9175c7255b315e2ed2e73c3e5a2b67da612597357d2e1bf83c9eb7b2aea262d7ff651855dd5aaab05ca463aa0afb934f64b08037aa02c
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
417KB
MD5f76c87de4f88f5e997d205add85666c2
SHA1f5fe7df9f8fb4c5cd7e515956d013bf7401c031b
SHA256471b57e0717b74ca681b07b7a1c3db861950dde91095f81d03935e6a0c11dc84
SHA51299bb6a6650ef7380ee396e0a924449c98473b336014e544940a703c6f45ebae2ede5ed67c0ec293d755b04a3321805d84315408d84c4a112438c0c889076308c