Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 05:05
Behavioral task
behavioral1
Sample
f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
f7a097ec7811f82c11296085e9cd539d
-
SHA1
b40d0447a9d5ba906d56551b78311f2c39ec9838
-
SHA256
22b66c1abab1e0f7a30db72426404815300c715bc1bc49f3d0b1edb4b4cb3e27
-
SHA512
a9373f0239b42b061b8784018893824531ca44cb8f1098c1b7043253ad659fc2acade29066edbcc2a2181e2db1e1f209d958139fb1b0dacf60fd1afedd93f83a
-
SSDEEP
49152:aSwf/YI9og/xeRK9jj18c8GuwhkRIjx1apgubKe3:aS0Q2o+xkK5j1lSwhkix1DQR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/5052-18-0x0000000000400000-0x00000000005EB000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4428 win.exe 1436 win.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4428 set thread context of 1436 4428 win.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4776 vlc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1436 win.exe 1436 win.exe 1436 win.exe 1436 win.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4776 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4520 AUDIODG.EXE Token: 33 4776 vlc.exe Token: SeIncBasePriorityPrivilege 4776 vlc.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe 4776 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4776 vlc.exe 4776 vlc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4428 5052 f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe 82 PID 5052 wrote to memory of 4428 5052 f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe 82 PID 5052 wrote to memory of 4428 5052 f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe 82 PID 5052 wrote to memory of 4776 5052 f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe 83 PID 5052 wrote to memory of 4776 5052 f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe 83 PID 4428 wrote to memory of 1436 4428 win.exe 85 PID 4428 wrote to memory of 1436 4428 win.exe 85 PID 4428 wrote to memory of 1436 4428 win.exe 85 PID 4428 wrote to memory of 1436 4428 win.exe 85 PID 4428 wrote to memory of 1436 4428 win.exe 85 PID 4428 wrote to memory of 1436 4428 win.exe 85 PID 4428 wrote to memory of 1436 4428 win.exe 85 PID 1436 wrote to memory of 3424 1436 win.exe 56 PID 1436 wrote to memory of 3424 1436 win.exe 56 PID 1436 wrote to memory of 3424 1436 win.exe 56 PID 1436 wrote to memory of 3424 1436 win.exe 56 PID 1436 wrote to memory of 3424 1436 win.exe 56 PID 1436 wrote to memory of 3424 1436 win.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\win.exe"C:\Users\Admin\AppData\Local\Temp\win.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\win.exeR4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Exclusive Girls beautiful show ass Get Fucked(1).scr.mpg"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x520 0x5281⤵
- Suspicious use of AdjustPrivilegeToken
PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5bb4bac0f1b7a2babc942346fef8a097a
SHA1883f7aa12ce70671b15b6a9d687c05228b85b605
SHA256c8f9ae95042b57e8a42dbf9037563db42a2c3e4a571d0178c0deb27ccdaaf5a2
SHA512bf037b13ac8d416a0b09443903934c1625b6b7e788c2010ce369d2d8e9659b3d424e39ea56a8d0ff8e883e379e7d7b58813cf637e9b0bc2bdb10e898c3627fe2
-
Filesize
82KB
MD570d8b66d2dc979835ec43fb0afe8fee4
SHA1a5c047bd5af8c4660227ab21a535dd6fdbc6f332
SHA256e3cb606532867110847f0b992b5731b75cc3c8be153293a818c2996de33cc7ed
SHA512e18c856da156caad49c3cabaf49e486c0973780ecbf90597f4e786d9c8eead653f4bf67fdd747545eba2b99fbc9cc81fe59a32ef5ba9553f6d063e2085cd5d33