Analysis
-
max time kernel
94s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 09:36
Behavioral task
behavioral1
Sample
abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe
-
Size
21KB
-
MD5
abdaa4e9d872b53b6b13b806fb41bbbf
-
SHA1
058851204a09db9c0931d58b8d737201ce162294
-
SHA256
19d8ca024b514e8f5020bc6e78b2e1b0554a94fe8e9fcbfd97c3a89c3c1b28b9
-
SHA512
452259f7dce3ee3e44e8efd7ef338eeb775d75d67bf678377edc8a9fdfe9480e7d87a730439036c539cca4425dbc7fcb3a04ab9f4ad9e26593ac6da980175125
-
SSDEEP
384:LPozK7rUdtBat52onuUxByAbyd65skPUbbeSrX+7W95NwrXh:TkK7oHB051uUXTboeTUbbdu7m
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/532-4-0x0000000013140000-0x0000000013151000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 532 set thread context of 544 532 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 83 -
resource yara_rule behavioral2/memory/532-0-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral2/memory/544-1-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/532-4-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral2/memory/544-5-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/544-7-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/544-10-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/544-13-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2000 sc.exe 3312 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 532 wrote to memory of 544 532 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 83 PID 532 wrote to memory of 544 532 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 83 PID 532 wrote to memory of 544 532 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 83 PID 532 wrote to memory of 544 532 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 83 PID 532 wrote to memory of 544 532 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 83 PID 544 wrote to memory of 2276 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 84 PID 544 wrote to memory of 2276 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 84 PID 544 wrote to memory of 2276 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 84 PID 544 wrote to memory of 3288 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 85 PID 544 wrote to memory of 3288 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 85 PID 544 wrote to memory of 3288 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 85 PID 2276 wrote to memory of 112 2276 net.exe 88 PID 2276 wrote to memory of 112 2276 net.exe 88 PID 2276 wrote to memory of 112 2276 net.exe 88 PID 3288 wrote to memory of 1292 3288 net.exe 89 PID 3288 wrote to memory of 1292 3288 net.exe 89 PID 3288 wrote to memory of 1292 3288 net.exe 89 PID 544 wrote to memory of 2000 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 90 PID 544 wrote to memory of 2000 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 90 PID 544 wrote to memory of 2000 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 90 PID 544 wrote to memory of 3312 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 91 PID 544 wrote to memory of 3312 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 91 PID 544 wrote to memory of 3312 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 91 PID 544 wrote to memory of 1852 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 110 PID 544 wrote to memory of 1852 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 110 PID 544 wrote to memory of 1852 544 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:112
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.bat3⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3