Analysis
-
max time kernel
95s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 11:48
Behavioral task
behavioral1
Sample
a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe
-
Size
224KB
-
MD5
a1c025fc274e1ea1443515273b816142
-
SHA1
c1a7d75c0a769735ffa4110977bf9ea3c8511fc0
-
SHA256
f2f79f4e80519e3eb0136b6f89dac2268ec6a64964afc131438845d3c2e5f653
-
SHA512
70e3523be16d6a60475e1e3f69af2732daf3cd0f321ea2cb83b7ceb03febcc11c561038c90f7743a41f5a03ded21ea6821673aa58b24c0d36479d45b5a42872d
-
SSDEEP
3072:7JBMwprZBp4VC/q3cGftIrfDP7xoo19qDfnQoCbg7SiWN:dntZBGVEQcGfcT9oo3unQvbg7Ra
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/2780-9-0x0000000000400000-0x000000000043F000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 killer ÓíÑÝÑ ÎÇã.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language killer ÓíÑÝÑ ÎÇã.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2180 killer ÓíÑÝÑ ÎÇã.exe 2180 killer ÓíÑÝÑ ÎÇã.exe 2180 killer ÓíÑÝÑ ÎÇã.exe 2180 killer ÓíÑÝÑ ÎÇã.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2180 2780 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 82 PID 2780 wrote to memory of 2180 2780 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 82 PID 2780 wrote to memory of 2180 2780 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 82 PID 2180 wrote to memory of 3508 2180 killer ÓíÑÝÑ ÎÇã.exe 56 PID 2180 wrote to memory of 3508 2180 killer ÓíÑÝÑ ÎÇã.exe 56 PID 2180 wrote to memory of 3508 2180 killer ÓíÑÝÑ ÎÇã.exe 56 PID 2180 wrote to memory of 3508 2180 killer ÓíÑÝÑ ÎÇã.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\killer ÓíÑÝÑ ÎÇã.exe"C:\Users\Admin\AppData\Local\Temp\killer ÓíÑÝÑ ÎÇã.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5e7f2cfa32ba337cd5343758c3cd1cce2
SHA185d19db4ded9168a40f83ae91f2d6607796c0dc9
SHA2561e057edcfa8b79d3a2e477e491b46492a6eb7c40c04b73f56d84938ba926e714
SHA5129d6b01096350760f952e9e4a6be8eb1ef3ea07c1c43bb935fefc9dd6c54018d3f56823347882b08fb48007e2341d7b2278f7f9b8459bb4239f5bccb166191893