Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe
-
Size
473KB
-
MD5
ffcf4ba76c6b1ad0072dd5085c9a935e
-
SHA1
3c43e4654473760a4dff670336699197fb5e9bbc
-
SHA256
1668be8bc8a8eed61f766c3f5b6b0f504a41013a6511a18c7b974297917f6a82
-
SHA512
99dcbd98a3401de3d406d11311b3d3f64de80f408ce40ffef1a57e508e2cc97b8f78b1a932d9a38ebdc618651e983bce315ce37d567ca97dd89e5fa973763b4e
-
SSDEEP
6144:ezuHkfxCH5YG3CT0+tHCIqksFbtD2qy4xQ/SS4BWv/fmse0fn+22EJeY1oL9OILc:dHkk3L+RCI1sqqyQ+SVWese0JqOABfe
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 12 IoCs
resource yara_rule behavioral1/memory/2544-13-0x0000000000400000-0x00000000004D2B00-memory.dmp modiloader_stage2 behavioral1/memory/2100-26-0x0000000000400000-0x00000000004D2B00-memory.dmp modiloader_stage2 behavioral1/memory/2544-27-0x0000000000400000-0x00000000004D2B00-memory.dmp modiloader_stage2 behavioral1/memory/2688-16-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 behavioral1/memory/2688-28-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 behavioral1/memory/2688-38-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 behavioral1/memory/2688-39-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 behavioral1/memory/2688-40-0x0000000000400000-0x00000000004D2B00-memory.dmp modiloader_stage2 behavioral1/memory/2688-47-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 behavioral1/memory/2688-48-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 behavioral1/memory/2688-55-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 behavioral1/memory/2688-56-0x00000000004E0000-0x000000000058A000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2700 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2544 matsc.exe 2688 matsc.exe -
Loads dropped DLL 2 IoCs
pid Process 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat matsc.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\matsc.exe ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\matsc.exe ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\DaverDel.bat ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language matsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" matsc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3c-ab-3a-3a-ae\WpadDetectedUrl matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6BACC344-4DFD-4C51-98A1-AC318DE7B9AE}\WpadDecisionTime = d059e526e412db01 matsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections matsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad matsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" matsc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6BACC344-4DFD-4C51-98A1-AC318DE7B9AE} matsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3c-ab-3a-3a-ae\WpadDecisionReason = "1" matsc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" matsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6BACC344-4DFD-4C51-98A1-AC318DE7B9AE}\WpadDecisionReason = "1" matsc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix matsc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3c-ab-3a-3a-ae\WpadDecisionTime = f0275ddfe312db01 matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00f6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 matsc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6BACC344-4DFD-4C51-98A1-AC318DE7B9AE}\WpadNetworkName = "Network 3" matsc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3c-ab-3a-3a-ae matsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3c-ab-3a-3a-ae\WpadDecision = "0" matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6BACC344-4DFD-4C51-98A1-AC318DE7B9AE}\WpadDecisionTime = f0275ddfe312db01 matsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6BACC344-4DFD-4C51-98A1-AC318DE7B9AE}\WpadDecision = "0" matsc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings matsc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" matsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ matsc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings matsc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6BACC344-4DFD-4C51-98A1-AC318DE7B9AE}\de-3c-ab-3a-3a-ae matsc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-3c-ab-3a-3a-ae\WpadDecisionTime = d059e526e412db01 matsc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2544 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2544 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2544 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2544 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2700 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2700 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2700 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2700 2100 ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffcf4ba76c6b1ad0072dd5085c9a935e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\matsc.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\matsc.exe"2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DaverDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\matsc.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\matsc.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD59851bde8a081e41a9ae8cf22fde94302
SHA114c67ed02c0f0e8eb6e4b5a96d04f7c01cbf85fe
SHA2566227a934895dc4191496b3f2202d00b89c3661b3cc505b4b195ef6123af80b5a
SHA512a3250b165123b7da2853ada6ba1e3b857f1cc89031e5c36b2c061012c5db9fef13fbda1e15b6128d7e6ef4f1d2be295193580b88d0a927f80d04a6c41cda76b4
-
Filesize
473KB
MD5ffcf4ba76c6b1ad0072dd5085c9a935e
SHA13c43e4654473760a4dff670336699197fb5e9bbc
SHA2561668be8bc8a8eed61f766c3f5b6b0f504a41013a6511a18c7b974297917f6a82
SHA51299dcbd98a3401de3d406d11311b3d3f64de80f408ce40ffef1a57e508e2cc97b8f78b1a932d9a38ebdc618651e983bce315ce37d567ca97dd89e5fa973763b4e