Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 09:23
Behavioral task
behavioral1
Sample
bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe
-
Size
28KB
-
MD5
bcbc26f767b5cfa00b9db761ecea3314
-
SHA1
c34ace4179b4374278e96045ad9b02ccc96f45ac
-
SHA256
599ebde2d698c0db80fae6a1a80e4260996924ec9a1233f387dcd61587ed6bc0
-
SHA512
84b931e278be14afe12a39f16b4df4cadd8304fc71fa8b56ecbe82dca5da15ee157ff303206cce3a3f0209fc00bca03d6b55c4b1789faa0c9ccb9a106addabaf
-
SSDEEP
768:j+3PwFwreBECRGWOYh47b+4Nek/cSBX/8oDOiVGWyU:jmvrmGee7tek/Dk8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/1628-6-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1196-7-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1196-12-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1196-13-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1196 msser64.exe -
resource yara_rule behavioral2/memory/1628-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/files/0x0007000000023ca5-3.dat upx behavioral2/memory/1628-6-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1196-7-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1196-12-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1196-13-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\olefiles\msser64.exe bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe File opened for modification C:\Windows\olefiles\msser64.exe bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msser64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe 1628 bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe 1196 msser64.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1196 1628 bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe 83 PID 1628 wrote to memory of 1196 1628 bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe 83 PID 1628 wrote to memory of 1196 1628 bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcbc26f767b5cfa00b9db761ecea3314_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\olefiles\msser64.exeC:\Windows\olefiles\msser64.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5bcbc26f767b5cfa00b9db761ecea3314
SHA1c34ace4179b4374278e96045ad9b02ccc96f45ac
SHA256599ebde2d698c0db80fae6a1a80e4260996924ec9a1233f387dcd61587ed6bc0
SHA51284b931e278be14afe12a39f16b4df4cadd8304fc71fa8b56ecbe82dca5da15ee157ff303206cce3a3f0209fc00bca03d6b55c4b1789faa0c9ccb9a106addabaf