Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 15:02
Behavioral task
behavioral1
Sample
a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe
-
Size
66KB
-
MD5
a8665cc4b33e01628e6ecad66af25a66
-
SHA1
357f4afdd354b4d01182d78dfd902603eb32abd9
-
SHA256
ce8d4330b4d2b4575169c71287e8f55547dc7c213279fd405744d199616e4a3a
-
SHA512
046eed3432452203a46861e308120ff6343e7f1ab4f6eee25d4993137c772f00acc20839280128d8d3ace25c4092be068a513366bda6a03a7824c25399cb1f3b
-
SSDEEP
1536:44WFlsrCnE03afjhpQoHRqZR8vUsoWb2:4fqjfHQoxqLsfoK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/2416-8-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2192 Server.exe 2192 Server.exe 2192 Server.exe 2192 Server.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2192 2416 a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe 82 PID 2416 wrote to memory of 2192 2416 a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe 82 PID 2416 wrote to memory of 2192 2416 a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe 82 PID 2192 wrote to memory of 3524 2192 Server.exe 56 PID 2192 wrote to memory of 3524 2192 Server.exe 56 PID 2192 wrote to memory of 3524 2192 Server.exe 56 PID 2192 wrote to memory of 3524 2192 Server.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8665cc4b33e01628e6ecad66af25a66_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD58a0d556e3e23e993cd7d2d75b114d7c9
SHA1597ae585b7f449a44514eb45a1848117cf59e40d
SHA256bb96eb4662e9e0765941318f19a0589e60512712298b7f4c1cb18d8b61d70c2e
SHA512c092dfee413b7464f945a753a58966e405c715330f5a9c0a348300afdd75fb2cd133fda24bd4f32844b4819ff40d993bf43804f8dd93c8bc1b4e5e8c332f586b