Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 07:49
Behavioral task
behavioral1
Sample
003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe
-
Size
722KB
-
MD5
003cff0b46b1494232b58775361eaf65
-
SHA1
7ef624ec274c51a9fe203cd91c670d33c2b4a69d
-
SHA256
e608cd2c919f15124e55ddc4dcc7456fca38461d59987d3b5d77223eb9292b3e
-
SHA512
85bf2ea80759cbfb84be28c2e4f1470a4c381010e61866aaf0c8b50f32ba17fa1427168843494da8959ba4781fd6ec41321ce711cdc762d64cf999a956c004a5
-
SSDEEP
12288:jRBjhLRSanSMItoRpsyPxVbZAxOxNiq4tqbVIsyPxVbZAxOxNiq4t:3jhFSaSXoRFP3bZWWiq4tEUP3bZWWiqW
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/files/0x0008000000023447-15.dat modiloader_stage2 behavioral2/memory/4260-28-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 behavioral2/memory/2344-49-0x00000000769A0000-0x0000000076A90000-memory.dmp modiloader_stage2 behavioral2/memory/3588-52-0x0000000000400000-0x0000000000483000-memory.dmp modiloader_stage2 behavioral2/memory/3588-65-0x0000000000400000-0x0000000000483000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation ÕæÑå Çáí ÇáÞÑíå.exe -
Executes dropped EXE 4 IoCs
pid Process 2408 bsdrKgd.EXE 3588 ÕæÑå Çáí ÇáÞÑíå.exe 2344 bsdrKgd.EXE 4000 bsdrKgd.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bsdrKgd.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ÕæÑå Çáí ÇáÞÑíå.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bsdrKgd.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bsdrKgd.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2408 4260 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe 82 PID 4260 wrote to memory of 2408 4260 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe 82 PID 4260 wrote to memory of 2408 4260 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe 82 PID 4260 wrote to memory of 3588 4260 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe 83 PID 4260 wrote to memory of 3588 4260 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe 83 PID 4260 wrote to memory of 3588 4260 003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe 83 PID 3588 wrote to memory of 2344 3588 ÕæÑå Çáí ÇáÞÑíå.exe 84 PID 3588 wrote to memory of 2344 3588 ÕæÑå Çáí ÇáÞÑíå.exe 84 PID 3588 wrote to memory of 2344 3588 ÕæÑå Çáí ÇáÞÑíå.exe 84 PID 3588 wrote to memory of 4000 3588 ÕæÑå Çáí ÇáÞÑíå.exe 85 PID 3588 wrote to memory of 4000 3588 ÕæÑå Çáí ÇáÞÑíå.exe 85 PID 3588 wrote to memory of 4000 3588 ÕæÑå Çáí ÇáÞÑíå.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\003cff0b46b1494232b58775361eaf65_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\bsdrKgd.EXE"C:\Users\Admin\AppData\Local\Temp\bsdrKgd.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\ÕæÑå Çáí ÇáÞÑíå.exe"C:\Users\Admin\AppData\Local\Temp\ÕæÑå Çáí ÇáÞÑíå.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\bsdrKgd.EXE"C:\Users\Admin\AppData\Local\Temp\bsdrKgd.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\bsdrKgd.EXE"C:\Users\Admin\AppData\Local\Temp\bsdrKgd.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD55e2c492048c8c4b39ada38865600b079
SHA113d92ec807d5ca544bbc8cb6f1c58d2241a3284f
SHA25655849f6dfb69299c6220cda34866dbe0face4e751483fb65736b45c27a160095
SHA51283ec1eb9de6303aad15d48154182028911a35f2f2ad4c89005815fd393392ce72292b57a482c99950c6b7d17a224ac926c9c2ed6b89a3c1790d9206d21fe1b91
-
Filesize
494KB
MD5b0088c49f6e22f89979e6177310e7edf
SHA1679eeadbe81240f745e5d4728438eb709861a89a
SHA256620a646092bc8e4cf413f40accd83c2202420ef151641ac26637cfbba2181b0f
SHA51266115bfa86dfa034356bf964b2e61766e46551c281bb64991ca678321aea79a87e5d83c99f12c7fbddd0b736a8218efc755eb6cad6e335f53f408009d5fc70f1