Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 14:39
Behavioral task
behavioral1
Sample
85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe
-
Size
328KB
-
MD5
85f87eb7d77596c6404f53e25fa7e24e
-
SHA1
a70dc0eb32778f5b3cd8a412c66bbb9ce082ed5a
-
SHA256
d8a6731bcaa9520380ed44fdfdbb1053a1c861fb5ab35046c0dc1eb9093650d7
-
SHA512
753b21ec76afe1962e004d539e4c5b1db5949ddbc084e6de3f85998eeef08a6e00f741075bcad3498145579e4f7441d904b03ebbc072b3a1ebeb7fa3cb18e52f
-
SSDEEP
6144:X8ppr6oVwAT/Y/GABOx7SYxiO5S/FkGb7UH0DzEwD/L:sp4oVn8emYxPGPUUDl/L
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service 3 TTPs 4 IoCs
Processes:
INSTALLER.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List INSTALLER.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile INSTALLER.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications INSTALLER.EXE Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files\Internet Explorer\IEXPLORE.EXE = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE:*:Enabled:Internet Explorer" INSTALLER.EXE -
Modiloader family
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023c90-12.dat modiloader_stage2 behavioral2/memory/2700-16-0x0000000000400000-0x0000000000459000-memory.dmp modiloader_stage2 behavioral2/memory/2124-20-0x0000000013140000-0x0000000013163000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
Processes:
DIVXWEBPLAYERINSTALLER.EXEINSTALLER.EXEINSTALLER.EXEpid Process 64 DIVXWEBPLAYERINSTALLER.EXE 2124 INSTALLER.EXE 4548 INSTALLER.EXE -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
INSTALLER.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\browser helper objects\{36DBC179-A19F-48F2-B16A-6A3E19B42A87} INSTALLER.EXE -
Drops file in System32 directory 2 IoCs
Processes:
INSTALLER.EXEdescription ioc Process File created C:\Windows\SysWOW64\ipv6monl.dll INSTALLER.EXE File opened for modification C:\Windows\SysWOW64\ipv6monl.dll INSTALLER.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
INSTALLER.EXEdescription pid Process procid_target PID 2124 set thread context of 4548 2124 INSTALLER.EXE 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exeDIVXWEBPLAYERINSTALLER.EXEINSTALLER.EXEINSTALLER.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DIVXWEBPLAYERINSTALLER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INSTALLER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INSTALLER.EXE -
Processes:
INSTALLER.EXEdescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" INSTALLER.EXE -
Modifies registry class 5 IoCs
Processes:
INSTALLER.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87}\InprocServer32 INSTALLER.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87}\InprocServer32\ = "C:\\Windows\\SysWow64\\ipv6monl.dll" INSTALLER.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87}\InprocServer32\ThreadingModel = "apartment" INSTALLER.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87} INSTALLER.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{36DBC179-A19F-48F2-B16A-6A3E19B42A87} INSTALLER.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
INSTALLER.EXEpid Process 4548 INSTALLER.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exeINSTALLER.EXEdescription pid Process procid_target PID 2700 wrote to memory of 64 2700 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe 84 PID 2700 wrote to memory of 64 2700 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe 84 PID 2700 wrote to memory of 64 2700 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe 84 PID 2700 wrote to memory of 2124 2700 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe 85 PID 2700 wrote to memory of 2124 2700 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe 85 PID 2700 wrote to memory of 2124 2700 85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe 85 PID 2124 wrote to memory of 4548 2124 INSTALLER.EXE 86 PID 2124 wrote to memory of 4548 2124 INSTALLER.EXE 86 PID 2124 wrote to memory of 4548 2124 INSTALLER.EXE 86 PID 2124 wrote to memory of 4548 2124 INSTALLER.EXE 86 PID 2124 wrote to memory of 4548 2124 INSTALLER.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85f87eb7d77596c6404f53e25fa7e24e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\DIVXWEBPLAYERINSTALLER.EXE"C:\Users\Admin\AppData\Local\Temp\DIVXWEBPLAYERINSTALLER.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:64
-
-
C:\Users\Admin\AppData\Local\Temp\INSTALLER.EXE"C:\Users\Admin\AppData\Local\Temp\INSTALLER.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\INSTALLER.EXEC:\Users\Admin\AppData\Local\Temp\INSTALLER.EXE3⤵
- Modifies firewall policy service
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4548
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Browser Extensions
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179KB
MD568d15a9ef85b1a195aefa82a53581170
SHA15c7f938e98afe27b17322ced790e27a23bf74d5b
SHA256ca0dedd4c80c9addd0898340abb55ab54aefb5a5027a563328c2db08c18d0882
SHA512d5bb98b3dc580e5c4e0f2cbbc9713895987040461f16e6058c4927223673f3faa72aafc87d3079e8c6692f1c1970d81fa6a0a08e155d621192a4a9be8ecc2d2a
-
Filesize
112KB
MD534ba1f6300ecfaf7bc0f8b06955cc4bc
SHA1a05240a098da6ceb842912a6d1b2256eb45137d5
SHA256a03cff756ee7677cbcc2b2ceae601664263b91ba073c1e6a819a52d99fb63554
SHA5126e8e348c0506a576bd39ed1a4a5df012c9e079d2d44165a800e6a2f9c163cd6451e39e9fe8eacf502c5c99d4fef9ebb0eb6057c9791d95a27af565c5af4458aa