Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 23:51
Behavioral task
behavioral1
Sample
8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe
-
Size
321KB
-
MD5
8e1e0bee60b300b13d3b19ddeeccb451
-
SHA1
5e8275bd92edadebafb274b708e007070a60ae04
-
SHA256
06c4188e0887f82659818f34dd7f708ab0afa93a11ef67c75d065061b50bcc58
-
SHA512
1527f0273b6e91cf41926b1f3fb04f2af6122baa229f82962a61e73ce14c2a6a977d859903697bd7ae86f70eb7f0f5700dc32a76f798a03493d79b0feb28d588
-
SSDEEP
6144:/qWBgyJ571HMb62TB8zo8MDP/ty4Yx6vTRupdC3jsNX7xjl+:/qWBgy11sWjzoZTt/7vToYjMVj0
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Detected Nirsoft tools 5 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1380-15-0x0000000000400000-0x000000000041E000-memory.dmp Nirsoft behavioral2/memory/1152-26-0x0000000000400000-0x0000000000414000-memory.dmp Nirsoft behavioral2/memory/1752-31-0x0000000000400000-0x000000000041A000-memory.dmp Nirsoft behavioral2/memory/4112-41-0x0000000000400000-0x0000000000417000-memory.dmp Nirsoft behavioral2/memory/4972-46-0x0000000000400000-0x0000000000410000-memory.dmp Nirsoft -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1368-4-0x0000000010000000-0x0000000010057000-memory.dmp modiloader_stage2 -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1752-31-0x0000000000400000-0x000000000041A000-memory.dmp MailPassView -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1368 set thread context of 428 1368 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 84 PID 428 set thread context of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 set thread context of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 set thread context of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 set thread context of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 set thread context of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 set thread context of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 set thread context of 4972 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 120 -
Program crash 7 IoCs
pid pid_target Process procid_target 4296 1380 WerFault.exe 85 1080 2612 WerFault.exe 97 1708 1152 WerFault.exe 105 4588 1752 WerFault.exe 109 3152 3936 WerFault.exe 112 2484 4112 WerFault.exe 115 3608 4972 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 428 1368 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 84 PID 1368 wrote to memory of 428 1368 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 84 PID 1368 wrote to memory of 428 1368 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 84 PID 1368 wrote to memory of 428 1368 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 84 PID 1368 wrote to memory of 428 1368 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 84 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 1380 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 85 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 2612 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 97 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1152 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 105 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 1752 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 109 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 3936 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 112 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4112 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 115 PID 428 wrote to memory of 4972 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 120 PID 428 wrote to memory of 4972 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 120 PID 428 wrote to memory of 4972 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 120 PID 428 wrote to memory of 4972 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 120 PID 428 wrote to memory of 4972 428 8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 124⤵
- Program crash
PID:4296
-
-
-
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 124⤵
- Program crash
PID:1080
-
-
-
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 124⤵
- Program crash
PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 124⤵
- Program crash
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 124⤵
- Program crash
PID:3152
-
-
-
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵PID:4112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 124⤵
- Program crash
PID:2484
-
-
-
C:\Users\Admin\AppData\Local\Temp\8e1e0bee60b300b13d3b19ddeeccb451_JaffaCakes118.exe/stext C:\Users\Admin\AppData\Local\Temp\temp.txt3⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 124⤵
- Program crash
PID:3608
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1380 -ip 13801⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2612 -ip 26121⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1152 -ip 11521⤵PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1752 -ip 17521⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3936 -ip 39361⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4112 -ip 41121⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4972 -ip 49721⤵PID:2892