Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe
-
Size
652KB
-
MD5
e78f3c27ee7a2f6f8591a10f7119f8d9
-
SHA1
503491a78ddadb380662ba09dd9e36a6a537fb1d
-
SHA256
11c7a9f9e267b56a3de35b5f5566bc445e3e843200a8d9c04f291709d83df270
-
SHA512
e5c86764a8ea48b1014f3d724181fa0ca069ca4c866b1cb962438b2f1e621c78929b5eaae898b7ab8e6896e9bfb0015ed8cc88842f139f7e88ec7fb24d896451
-
SSDEEP
12288:yh4royScE8XokY8g4DnmNpT5yYFNSgUUVeuqOD7+CC0l5Csi8jHEgau:yKrd74gV7mNpT5RFNSxse3a7+N0XLieP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4900-31-0x0000000000400000-0x00000000005B3000-memory.dmp modiloader_stage2 behavioral2/memory/4900-32-0x0000000000400000-0x00000000005B3000-memory.dmp modiloader_stage2 behavioral2/memory/4900-34-0x0000000000400000-0x00000000005B3000-memory.dmp modiloader_stage2 behavioral2/memory/4900-36-0x0000000000400000-0x00000000005B3000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/files/0x000a000000023b7d-7.dat aspack_v212_v242 -
Executes dropped EXE 3 IoCs
pid Process 2200 QQÍ£³µ~1.EXE 2344 20.EXE 4900 1vmp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" 20.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt 1vmp.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QQÍ£³µ~1.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2200 QQÍ£³µ~1.EXE 2200 QQÍ£³µ~1.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4712 wrote to memory of 2200 4712 e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe 83 PID 4712 wrote to memory of 2200 4712 e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe 83 PID 4712 wrote to memory of 2200 4712 e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe 83 PID 4712 wrote to memory of 2344 4712 e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe 85 PID 4712 wrote to memory of 2344 4712 e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe 85 PID 4712 wrote to memory of 2344 4712 e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe 85 PID 2344 wrote to memory of 4900 2344 20.EXE 86 PID 2344 wrote to memory of 4900 2344 20.EXE 86 PID 2344 wrote to memory of 4900 2344 20.EXE 86 PID 4900 wrote to memory of 4404 4900 1vmp.exe 92 PID 4900 wrote to memory of 4404 4900 1vmp.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e78f3c27ee7a2f6f8591a10f7119f8d9_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QQÍ£³µ~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QQÍ£³µ~1.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\20.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\20.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1vmp.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1vmp.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"4⤵PID:4404
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5b2ff548bb0613b3a9ab7243852de9e38
SHA10534f360e8f14e4beb564a03e7a3aab25a313e0b
SHA256703254eb3496adefdf8473159df6ee4aec6b933be596bd68b47ebb27e94fa105
SHA512603920e35d02c5ea865c60db007347e4c564fcb5dfe238c73e9c6bcbc9074a747d89470e9646d04f404ac755c62f35be43899eb02326444388459821a33e4b2f
-
Filesize
254KB
MD50d66e997c1b214bd9c8967fa78e830e5
SHA1f000f3eaaf1eeb5b60128b7d705d92ade9e6cad2
SHA256f88fef386445a9f1694f3e53a77a9afc3ec50cc3c7a08fa9f46ac05938710dce
SHA512ead03b498f196d3379409160a18a242cc434859a602ada7b25cbe6c13eaeda5ab4835b8f73cae3ab600438c89dfceadf328234e49891a2a7f1c190087ed898fa
-
Filesize
305KB
MD5324e3139f416ab9dad7f3038e4518fd9
SHA1c196524247c29c23fd11cce7ec5611a8dff3e3c0
SHA25685b2cb1d3de8193de37c00894b4b776e49f52e51f3dde019209860e36e9f96b9
SHA5124c964add20b9f7230cfb352f224e032843cca0c68966aadbeda928c606e23b4e1caa915c21ca05d59a647a290061f33e8f2894f53db3727611a36d540b3be2e0