Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe
-
Size
801KB
-
MD5
d78674a0b1e4d82307e8ec37a70bdbf2
-
SHA1
8cb6cb00ac93481527492b374c43bfb070db164b
-
SHA256
dafa0160ac5f814b90db131d77d29fa16b68d76df3243dafbb0a51a968e725cd
-
SHA512
228a48242b62eeeb1697a5c55e431745cd61f5cbb4617dac76cac6d54403a71d527891f5f9e5f23ba312d59037ed3a0d660d7d1f3a43407267829880902a54c2
-
SSDEEP
24576:D+pCK0Adttc//////RTJ5cpbpE5M88FTdI+r7lquHce:q7tdHc//////RTJ5ypE5MRF51r7dce
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/files/0x0007000000023cae-7.dat modiloader_stage2 behavioral2/memory/628-16-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 behavioral2/memory/3328-17-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 behavioral2/memory/3328-24-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 behavioral2/memory/3328-30-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 628 yt.exe 3328 Adobef.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\Adobef.exe yt.exe File opened for modification C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\Adobef.exe yt.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobef.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 824 wrote to memory of 644 824 d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe 83 PID 824 wrote to memory of 644 824 d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe 83 PID 824 wrote to memory of 644 824 d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe 83 PID 824 wrote to memory of 4552 824 d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe 84 PID 824 wrote to memory of 4552 824 d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe 84 PID 824 wrote to memory of 4552 824 d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe 84 PID 644 wrote to memory of 628 644 cmd.exe 87 PID 644 wrote to memory of 628 644 cmd.exe 87 PID 644 wrote to memory of 628 644 cmd.exe 87 PID 628 wrote to memory of 3328 628 yt.exe 88 PID 628 wrote to memory of 3328 628 yt.exe 88 PID 628 wrote to memory of 3328 628 yt.exe 88 PID 628 wrote to memory of 696 628 yt.exe 89 PID 628 wrote to memory of 696 628 yt.exe 89 PID 628 wrote to memory of 696 628 yt.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\yt.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\yt.exeC:\Users\Admin\AppData\Local\Temp\yt.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\Adobef.exeC:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\Adobef.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F C:\Users\Admin\AppData\Local\Temp\yt.exe4⤵
- System Location Discovery: System Language Discovery
PID:696
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\d78674a0b1e4d82307e8ec37a70bdbf2_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD56361714e688768f9a6d5535b090e3803
SHA1711683ef06cdd3425db1ca1604311e954c2fad7d
SHA2564299b9c3d5abe9cc2c6cdf8e859233381c7eee0788603a34bea90f16afa76a34
SHA512c3137a49e56672ea223e6bb0c02663d420e916b43d8988a3464ff79ba1b0893e510598f1390e0fea9f5db56573986ddd64fe138e9e0c0902d1261715678374d6