Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:40
Behavioral task
behavioral1
Sample
2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe
-
Size
371KB
-
MD5
2c9d430dec7f0000209b7165e2027d73
-
SHA1
ea5e2204a4ceeaeef90bc556a62d20994faa6fd8
-
SHA256
eec5e1f9da04020337128f5c7a4ebcc65631aa591136788b8638c951ee2f4a85
-
SHA512
19e56143654e72625362335f5fee7e7282561818d3fe8fdfcd1787c946d51c0489a1ffd8294e29c79fbc4c8be7a43647812cc2c8c5a97408d9f38e902d47c6ab
-
SSDEEP
6144:PPIFgrHYFqlk06w5lJAjCeSUV1MtavDF/zne9X7Xf2iTxErC4zY:3IFCHYF706i7HeSw10yDhe9X7LyrC4zY
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 10 IoCs
resource yara_rule behavioral2/memory/2288-36-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/3468-37-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-39-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-43-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-45-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-47-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-49-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-51-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-53-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral2/memory/4948-63-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation server.exe -
Executes dropped EXE 4 IoCs
pid Process 1768 Alcazer Update.exe 2288 server.exe 3468 server.exe 4948 Winservices.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" Winservices.exe -
resource yara_rule behavioral2/memory/3188-0-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3188-16-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/2288-23-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/files/0x0008000000023c76-22.dat upx behavioral2/memory/2288-36-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/3468-37-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-39-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-43-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-45-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-47-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-49-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-51-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-53-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/4948-63-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Winservices.exe server.exe File opened for modification C:\Windows\Winservices.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Winservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alcazer Update.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3188 2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe 1768 Alcazer Update.exe 3468 server.exe 4948 Winservices.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3188 wrote to memory of 1768 3188 2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe 85 PID 3188 wrote to memory of 1768 3188 2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe 85 PID 3188 wrote to memory of 1768 3188 2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe 85 PID 1768 wrote to memory of 2288 1768 Alcazer Update.exe 87 PID 1768 wrote to memory of 2288 1768 Alcazer Update.exe 87 PID 1768 wrote to memory of 2288 1768 Alcazer Update.exe 87 PID 1768 wrote to memory of 3468 1768 Alcazer Update.exe 88 PID 1768 wrote to memory of 3468 1768 Alcazer Update.exe 88 PID 1768 wrote to memory of 3468 1768 Alcazer Update.exe 88 PID 2288 wrote to memory of 4948 2288 server.exe 89 PID 2288 wrote to memory of 4948 2288 server.exe 89 PID 2288 wrote to memory of 4948 2288 server.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c9d430dec7f0000209b7165e2027d73_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\Alcazer Update.exe"C:\Users\Admin\AppData\Local\Temp\Alcazer Update.exe" 02⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\server.exeC:\\server.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\Winservices.exe"C:\Windows\Winservices.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4948
-
-
-
C:\server.exeC:\\server.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
367KB
MD55dadb5759009a28990c72ea7fc0c9cf2
SHA1544fe400a825f652de44154a15ecb9afe129329b
SHA2561fd7764250e3bddeeec37382a50da31161f2fbcf55a6133388f70774a59b10a3
SHA512816dd4f5e5d9129ce1b626fe764a969a0bb1e8231de3789a060dd965d0b28511daf4dffd1c8547872e7698c5892d0d9f8283983283e4917f4f492e4cb9f9c09c
-
Filesize
157KB
MD58b36554001524571d15176deaed686df
SHA1797fa19456a420bd0cd54d1d8a529b75e2ea64a9
SHA2563a8814870bb497857e4c8ddb09cc0b009f5e50395549c383c120bf1314262644
SHA5129c32ffb3e23e06c88eff5c389c8d8c051f7ab9bfd8815e759e0182977c444e767933da22d78b794ee2ce3a7b38d974c3510c298a77d34f1b38ab03563e089ed1