Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 02:08
Behavioral task
behavioral1
Sample
aa96e40363e19b4a3492662983805771_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
aa96e40363e19b4a3492662983805771_JaffaCakes118.exe
-
Size
27KB
-
MD5
aa96e40363e19b4a3492662983805771
-
SHA1
9e3d61ce12815e4c7f7398d5cf99e03072673172
-
SHA256
02281901066095d95f18550bda6e6c780fe38e1fbcb6d1d0065b12d3b93c3d23
-
SHA512
4a9e48aa308df2cac1a30e4403bba0f3c949ebe45d4dcdb7903057c6fa80bd7d3d3773ff9e887463a0f5b8c65eea3df1586031d37f41c5e8ee6ac8a767ca8e69
-
SSDEEP
384:BCkp9PmiCXlBHmCT01Jx90A+Q+u5A5b2Wh+jFRDXdGtJOBxuvrMG929Ueu:zp9f2GCg7EAKbkFRMODuvIG4y
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/452-1-0x0000000013140000-0x000000001314E000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 452 set thread context of 2204 452 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 84 -
resource yara_rule behavioral2/memory/2204-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2204-3-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2204-5-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/2204-10-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4676 sc.exe 444 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa96e40363e19b4a3492662983805771_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa96e40363e19b4a3492662983805771_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 452 wrote to memory of 2204 452 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 84 PID 452 wrote to memory of 2204 452 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 84 PID 452 wrote to memory of 2204 452 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 84 PID 452 wrote to memory of 2204 452 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 84 PID 452 wrote to memory of 2204 452 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 84 PID 2204 wrote to memory of 4152 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 85 PID 2204 wrote to memory of 4152 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 85 PID 2204 wrote to memory of 4152 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 85 PID 2204 wrote to memory of 4940 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 86 PID 2204 wrote to memory of 4940 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 86 PID 2204 wrote to memory of 4940 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 86 PID 4940 wrote to memory of 2872 4940 net.exe 89 PID 4940 wrote to memory of 2872 4940 net.exe 89 PID 4940 wrote to memory of 2872 4940 net.exe 89 PID 4152 wrote to memory of 4296 4152 net.exe 90 PID 4152 wrote to memory of 4296 4152 net.exe 90 PID 4152 wrote to memory of 4296 4152 net.exe 90 PID 2204 wrote to memory of 4676 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 91 PID 2204 wrote to memory of 4676 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 91 PID 2204 wrote to memory of 4676 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 91 PID 2204 wrote to memory of 444 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 92 PID 2204 wrote to memory of 444 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 92 PID 2204 wrote to memory of 444 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 92 PID 2204 wrote to memory of 2868 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 95 PID 2204 wrote to memory of 2868 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 95 PID 2204 wrote to memory of 2868 2204 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:4296
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.bat3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3