Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 08:34
Behavioral task
behavioral1
Sample
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe
-
Size
172KB
-
MD5
8a8d0a23a501737d2ab364d045e37548
-
SHA1
10644e77cc232104cb2eb1950b348193bc96daaa
-
SHA256
cd4573d8a04e00fa2daf15ccdb1c78a5923d44939e570e889ec118a1e36b207f
-
SHA512
f37f7eb7950e6001ee9eb53a0532a9b50dffc69e18f399f58d1cc7df4fe8115d602caa7fc36e7740edc28f2c5cb766b9c5e26cd6a1e2469f295b1a1d10a288b1
-
SSDEEP
3072:VtDulZKksYzZjDDeqCe5ToU21kkH2ip0KuPk2afiMpltkrkbtNLWGtge0L:V6KksgrIU2ykH2ipsPnafFlerkb3LrtO
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
server.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Windows\\server.exe\"" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "explorer.exe\"C:\\Windows\\server.exe\"," server.exe -
Modiloader family
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000a00000001e581-4.dat modiloader_stage2 behavioral2/memory/4928-34-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/224-42-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
server.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\server = "C:\\Windows\\server.exe" server.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
server.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C1WX2QV-37T4-38H5-W48B-8046V7MRL112} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0C1WX2QV-37T4-38H5-W48B-8046V7MRL112}\StubPath = "\"C:\\Windows\\server.exe\"" server.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
server.exepid Process 224 server.exe -
Drops file in Windows directory 2 IoCs
Processes:
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exedescription ioc Process File created C:\Windows\server.exe 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe File opened for modification C:\Windows\server.exe 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exeserver.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Modifies registry class 1 IoCs
Processes:
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exeserver.exedescription pid Process procid_target PID 4928 wrote to memory of 224 4928 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe 89 PID 4928 wrote to memory of 224 4928 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe 89 PID 4928 wrote to memory of 224 4928 8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe 89 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94 PID 224 wrote to memory of 2340 224 server.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a8d0a23a501737d2ab364d045e37548_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\server.exe"C:\Windows\server.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD58a8d0a23a501737d2ab364d045e37548
SHA110644e77cc232104cb2eb1950b348193bc96daaa
SHA256cd4573d8a04e00fa2daf15ccdb1c78a5923d44939e570e889ec118a1e36b207f
SHA512f37f7eb7950e6001ee9eb53a0532a9b50dffc69e18f399f58d1cc7df4fe8115d602caa7fc36e7740edc28f2c5cb766b9c5e26cd6a1e2469f295b1a1d10a288b1