Analysis
-
max time kernel
96s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe
-
Size
982KB
-
MD5
d5b3ba447ed77b4d99cde60fb73160e2
-
SHA1
a83a976db4cc6c42c846d450598bec275093bf2b
-
SHA256
f5b3dc1f5f534bf1054df001584ac1c1b164262ee69fcf1349bfb5414b02453c
-
SHA512
2f7d12df4e82b80fe0599af8e3ddbd69029a6d128136fab5c107a7bd434d3c9fe1ecf1df525cc51f23bd6fd2c6ea7022ab9b578b31e7d6a2370ec45c3ad4daa9
-
SSDEEP
768:bpoUE7J/dXlh0bjHt0u5KwdYumLGldKOwkusx8I:blo/7q/H6a/YuRl3x8I
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4804-8-0x0000000020000000-0x000000002006A000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\ d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\õ?Äå,YeQ„‡þM?Þ¼ÉÚé \-ŠØ70†6’+Øü]zsIjŽYî~Ïk”cô¦¾æ[ÒÈ\F˜lï4Ó{8Ú…Ó.—9Ë#J+ç@ë‰6!™¯Ì2ƒU™ O‰ûcÃäQ d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\õ?Äå,YeQ„‡þM?Þ¼ÉÚé d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\õ?Äå,YeQ„‡þM?Þ¼ÉÚé \-ŠØ70†6’+Øü]zsIjŽYî~Ïk”cô¦¾æ[ÒÈ d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\õ?Äå,YeQ„‡þM?Þ¼ÉÚé \-ŠØ70†6’+Øü]zsIjŽYî~Ïk”cô¦¾æ[ÒÈ\F˜lï4Ó{8Ú…Ó.—9Ë#J+ç@ë‰6!™¯Ì2ƒU™ O‰ûcÃäQ\StubPath = "C:\\Windows\\8Ú…Ó.—9Ë#J+ç@ë\b‰6!™¯Ì2ƒU™\rO‰ûcÃäQ 2" d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\ d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6!™¯Ì2ƒU™ O‰ûcÃäQ = "C:\\Windows\\8Ú…Ó.—9Ë#J+ç@ë\b‰6!™¯Ì2ƒU™\rO‰ûcÃäQ" d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6!™¯Ì2ƒU™ O‰ûcÃäQ = "C:\\Windows\\8Ú…Ó.—9Ë#J+ç@ë\b‰6!™¯Ì2ƒU™\rO‰ûcÃäQ" d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\*6!™¯Ì2ƒU™ O‰ûcÃäQ = "C:\\Windows\\8Ú…Ó.—9Ë#J+ç@ë\b‰6!™¯Ì2ƒU™\rO‰ûcÃäQ" d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*6!™¯Ì2ƒU™ O‰ûcÃäQ = "C:\\Windows\\8Ú…Ó.—9Ë#J+ç@ë\b‰6!™¯Ì2ƒU™\rO‰ûcÃäQ" d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4804 set thread context of 2044 4804 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\8Ú…Ó.—9Ë#J+ç@ë‰6!™¯Ì2ƒU™ O‰ûcÃäQ d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 2044 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2044 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2044 4804 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 83 PID 4804 wrote to memory of 2044 4804 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 83 PID 4804 wrote to memory of 2044 4804 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 83 PID 4804 wrote to memory of 2044 4804 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 83 PID 4804 wrote to memory of 2044 4804 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 83 PID 2044 wrote to memory of 3556 2044 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 56 PID 2044 wrote to memory of 3556 2044 d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d5b3ba447ed77b4d99cde60fb73160e2_JaffaCakes118.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044
-
-