Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 16:06
Behavioral task
behavioral1
Sample
c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe
-
Size
173KB
-
MD5
c350fa828c91aad3d58b891fb0be2a22
-
SHA1
00cf7b3ca77056322b4004f78b053465c4fc39c8
-
SHA256
e8261db9b6411dcf2c129312e9403c2d2e65530b231f26c1ed23df2d9c45a191
-
SHA512
4870ca22a21e97b1e64028dd9cae7a7f9d64f507921a1c2aabb487b43912a9a0004112dbbe08a72880be2f088c35ff96b264fc4aefe855ef1a2bd2b519678dbe
-
SSDEEP
3072:ytDulZKksFzZjDDeqCe5ToU21kkH2ip0KuPk2afiMpltkrkbtNLWGtdem:y6KksVrIU2ykH2ipsPnafFlerkb3LrtF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Windows\\scvhost.exe\"" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "explorer.exe\"C:\\Windows\\scvhost.exe\"," scvhost.exe -
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb1-4.dat modiloader_stage2 behavioral2/memory/2004-34-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 behavioral2/memory/2676-42-0x0000000000400000-0x0000000000433000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\scvhost = "C:\\Windows\\scvhost.exe" scvhost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63} scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63}\StubPath = "\"C:\\Windows\\scvhost.exe\"" scvhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2676 scvhost.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 scvhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\scvhost.exe c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe File created C:\Windows\scvhost.exe c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2676 2004 c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe 83 PID 2004 wrote to memory of 2676 2004 c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe 83 PID 2004 wrote to memory of 2676 2004 c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe 83 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84 PID 2676 wrote to memory of 3868 2676 scvhost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\scvhost.exe"C:\Windows\scvhost.exe" \melt "C:\Users\Admin\AppData\Local\Temp\c350fa828c91aad3d58b891fb0be2a22_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3868
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5c350fa828c91aad3d58b891fb0be2a22
SHA100cf7b3ca77056322b4004f78b053465c4fc39c8
SHA256e8261db9b6411dcf2c129312e9403c2d2e65530b231f26c1ed23df2d9c45a191
SHA5124870ca22a21e97b1e64028dd9cae7a7f9d64f507921a1c2aabb487b43912a9a0004112dbbe08a72880be2f088c35ff96b264fc4aefe855ef1a2bd2b519678dbe