Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 04:32
Behavioral task
behavioral1
Sample
d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe
-
Size
34KB
-
MD5
d0abc1ed558d2068af3d3945a9697a89
-
SHA1
4e3965195aad7b6943f297c29e101e2d73773152
-
SHA256
e0b9a31b4dc328347ce20b21bc723c16d85eb9f59ba0e3ccfdbe098f79f7bdf0
-
SHA512
0c8f0b0c43de176c292f72ce2fadc43e06f687a5a15bbe0347b3b58970ba23cf7002dcf48c5e52f35ebe2d9619f064252534ccc84c2201b615deb6bc8512b91d
-
SSDEEP
768:75zqnHQoY6VFH7mvGjRyEfwfruMq5H/OTh:lzqnHQoYsZtdfSufZ/OTh
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1872-8-0x0000000042590000-0x000000004259F000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4564 System320.exe 1224 System320.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\System320.exe d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 116 1224 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System320.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1872 wrote to memory of 4564 1872 d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe 83 PID 1872 wrote to memory of 4564 1872 d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe 83 PID 1872 wrote to memory of 4564 1872 d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe 83 PID 4564 wrote to memory of 1224 4564 System320.exe 84 PID 4564 wrote to memory of 1224 4564 System320.exe 84 PID 4564 wrote to memory of 1224 4564 System320.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0abc1ed558d2068af3d3945a9697a89_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\System320.exe"C:\Windows\System320.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\System320.exeStubPath3⤵
- Executes dropped EXE
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 4604⤵
- Program crash
PID:116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1224 -ip 12241⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5c1831542bc80c94f44b29a5360a316e7
SHA16a6bace91852a6ec1bc81d048106867c6a9f6c4e
SHA25625b5f8e590bae646a911d188cc01ad27a022d8b259d7c3d290515970916968ab
SHA5123473828dee7878574383e65e8c983bc1a4ff0b971d20b54fa8fb94dc877a5b6e4092e5170ab3eb078ccd8bca526b69a9228c684492b1307d29f67263e02903fc