Overview
overview
10Static
static
39e20a516f7...18.exe
windows7-x64
109e20a516f7...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3contact.html
windows7-x64
3contact.html
windows10-2004-x64
3privacy_policy.html
windows7-x64
3privacy_policy.html
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
contact.html
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
contact.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
privacy_policy.html
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
privacy_policy.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
uninstall.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
uninstall.exe
Resource
win10v2004-20241007-en
General
-
Target
9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe
-
Size
314KB
-
MD5
9e20a516f7cc4eaecffcc0808b50fb64
-
SHA1
1681838951cffa50dbb5c61bb686ecc424b24a94
-
SHA256
03d596c4e2ec8536abb673e0629fc31d4c5df8863f378a1372546cd8cae7caf8
-
SHA512
c0a5d56faa997cca2536031e0a1ce56ac0b9bb926b8e65f7e2209097453845058249e515f9a9d89fc873173af22bb916382cb3516317efea4d253cfd7a5a2776
-
SSDEEP
6144:TB+pgUmaidOrFsPlz67WoiAoMYC/yc2MbsLQcSQj2qzZyc76K:TgOaoyuPlzo3i7/QyfI+QRc7X
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3456 1052 mshta.exe 85 -
ModiLoader Second Stage 11 IoCs
resource yara_rule behavioral2/memory/3460-21-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/3460-26-0x0000000000400000-0x000000000043C000-memory.dmp modiloader_stage2 behavioral2/memory/3460-28-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-27-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-30-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-32-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-31-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-29-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-33-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-34-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 behavioral2/memory/3460-56-0x0000000003310000-0x00000000033EA000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation mshta.exe -
Loads dropped DLL 1 IoCs
pid Process 3460 9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe -
pid Process 2044 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 powershell.exe 2044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2044 powershell.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3460 9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 2044 3456 mshta.exe 87 PID 3456 wrote to memory of 2044 3456 mshta.exe 87 PID 3456 wrote to memory of 2044 3456 mshta.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e20a516f7cc4eaecffcc0808b50fb64_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:3460
-
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" javascript:cxawN3="LmO";v30q=new%20ActiveXObject("WScript.Shell");yc48inSJh="9";UL2YV=v30q.RegRead("HKCU\\software\\ftgnFgKaX\\E8R40Suyr0");j41cRbFJn="kwDgXyKq";eval(UL2YV);OPEV0d5="g";1⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:qbjzxloh2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
319B
MD548b7875eddf3913382a3c299e84a27f1
SHA16a05bcea4829a70ce0e1c105d0568ac5031d3e89
SHA25688332868551ed40475c1d8b88613910b60773ccb5760083b2037c55a21c002f5
SHA512d5b3a2f141d07242f9b6fdb71d77b821df76edb9677a2992ddfd16f242afc9df12ce5ae0dbd4c029d1c9dd7dc92b4069467c0ee4816c61e1693c46a8857d4a04
-
Filesize
11KB
MD5a4dd044bcd94e9b3370ccf095b31f896
SHA117c78201323ab2095bc53184aa8267c9187d5173
SHA2562e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
SHA51287335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
Filesize
3KB
MD5dab2f129c75c2369479d341a4f754e52
SHA1b88958b6379579bd380661ed83625114a41c1a5b
SHA256136ac48f0f2c86d9ba706455349703f76b9097271e8c61c94efa00a882ffc985
SHA51263058fd68daf8f02b4e0d7dea32ce8fb9fd456188878ebbe626bc354a394a8ca16f7aec2617d585e6e799801058775c29c6c08891fa77b05de857d409762e87e