Analysis
-
max time kernel
106s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe
-
Size
100KB
-
MD5
c47e756e3c153d0ddec6d27c7ede09a2
-
SHA1
43805115c3ff07c8eda4bef92e57904c11a1e5ac
-
SHA256
1e28928dbba0b860e22805a1d6a40c771ce1c975c1c0a9740adcf8f5010b9be2
-
SHA512
6f4e9300c0c360409ed55a6aa988b1a90f6077c4297df047feaa2a11d8117caf444a135c9ea301d22b0fd18d500d6aaf36aaed89c29b1283d041246ada0d071c
-
SSDEEP
1536:OgEs39DdAjgNuzCmH4Z2LKuRG/YI0ehne0SqA:9EodAjxmmCmzGwSne0XA
Malware Config
Extracted
latentbot
shootiemange.zapto.org
Signatures
-
Latentbot family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 20 IoCs
resource yara_rule behavioral2/memory/3924-5-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3924-6-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3924-67-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-76-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-77-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-75-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-80-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-81-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-82-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-83-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-84-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-85-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-86-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-87-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-88-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-89-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-90-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-91-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-92-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4084-93-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 svdhost.exe 4084 svdhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svdhost.exe" svdhost.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: svdhost.exe File opened (read-only) \??\H: svdhost.exe File opened (read-only) \??\L: svdhost.exe File opened (read-only) \??\M: svdhost.exe File opened (read-only) \??\R: svdhost.exe File opened (read-only) \??\E: svdhost.exe File opened (read-only) \??\N: svdhost.exe File opened (read-only) \??\P: svdhost.exe File opened (read-only) \??\U: svdhost.exe File opened (read-only) \??\W: svdhost.exe File opened (read-only) \??\Y: svdhost.exe File opened (read-only) \??\Z: svdhost.exe File opened (read-only) \??\G: svdhost.exe File opened (read-only) \??\I: svdhost.exe File opened (read-only) \??\K: svdhost.exe File opened (read-only) \??\T: svdhost.exe File opened (read-only) \??\X: svdhost.exe File opened (read-only) \??\J: svdhost.exe File opened (read-only) \??\O: svdhost.exe File opened (read-only) \??\Q: svdhost.exe File opened (read-only) \??\S: svdhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2544 set thread context of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 1948 set thread context of 4084 1948 svdhost.exe 85 -
resource yara_rule behavioral2/memory/3924-2-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3924-4-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3924-5-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3924-6-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3924-67-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-74-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-76-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-77-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-75-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-80-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-81-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-82-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-83-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-84-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-85-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-86-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-87-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-88-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-89-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-90-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-91-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-92-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4084-93-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svdhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svdhost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3924 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe Token: SeDebugPrivilege 3924 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe Token: SeDebugPrivilege 4084 svdhost.exe Token: SeDebugPrivilege 4084 svdhost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 1948 svdhost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 2544 wrote to memory of 3924 2544 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 83 PID 3924 wrote to memory of 1948 3924 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 84 PID 3924 wrote to memory of 1948 3924 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 84 PID 3924 wrote to memory of 1948 3924 c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe 84 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85 PID 1948 wrote to memory of 4084 1948 svdhost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c47e756e3c153d0ddec6d27c7ede09a2_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Roaming\Microsoft\svdhost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svdhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\Microsoft\svdhost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svdhost.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5c47e756e3c153d0ddec6d27c7ede09a2
SHA143805115c3ff07c8eda4bef92e57904c11a1e5ac
SHA2561e28928dbba0b860e22805a1d6a40c771ce1c975c1c0a9740adcf8f5010b9be2
SHA5126f4e9300c0c360409ed55a6aa988b1a90f6077c4297df047feaa2a11d8117caf444a135c9ea301d22b0fd18d500d6aaf36aaed89c29b1283d041246ada0d071c