Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe
-
Size
748KB
-
MD5
f202bf634484e0cb9c3b9f92170e4a9c
-
SHA1
a3369e0d10839cd0709f8f86ebacc24574a85dcb
-
SHA256
2df20f4c1df335e0d97e92a6c2b5e9d5f927ec55fc2c31490f7f025d0ebb2936
-
SHA512
105e560172f0a6e7b9219d21ae879137f8a244fcaf6340e5adba1f9f2bda94893e0e15a5cbb5c51125e81e62d346a56a98ee5765201c90ee2022f5036e3ae98a
-
SSDEEP
12288:a4uS9dPsdgcpSoFv9gH9/sCaKSc9D1gtje5UkxX4PROZ32h1Jkk7w3y909:aPE2SYvWHxHf59xgtje5resGjJD7w3yW
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/3588-37-0x0000000000400000-0x0000000000475000-memory.dmp modiloader_stage2 behavioral2/memory/2284-62-0x0000000000400000-0x0000000000475000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation DRIVER~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation DRIVER~3.EXE -
Executes dropped EXE 4 IoCs
pid Process 3588 DRIVER~3.EXE 3420 3d driving shool.exe 2284 DRIVER~3.EXE 4356 3d driving shool.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DRIVER~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d driving shool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DRIVER~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d driving shool.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3588 4280 f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe 83 PID 4280 wrote to memory of 3588 4280 f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe 83 PID 4280 wrote to memory of 3588 4280 f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe 83 PID 3588 wrote to memory of 3420 3588 DRIVER~3.EXE 84 PID 3588 wrote to memory of 3420 3588 DRIVER~3.EXE 84 PID 3588 wrote to memory of 3420 3588 DRIVER~3.EXE 84 PID 4280 wrote to memory of 2284 4280 f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe 85 PID 4280 wrote to memory of 2284 4280 f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe 85 PID 4280 wrote to memory of 2284 4280 f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe 85 PID 2284 wrote to memory of 4356 2284 DRIVER~3.EXE 86 PID 2284 wrote to memory of 4356 2284 DRIVER~3.EXE 86 PID 2284 wrote to memory of 4356 2284 DRIVER~3.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f202bf634484e0cb9c3b9f92170e4a9c_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~3.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~3.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\3d driving shool.exe"C:\Users\Admin\AppData\Local\Temp\3d driving shool.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~3.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~3.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\3d driving shool.exe"C:\Users\Admin\AppData\Local\Temp\3d driving shool.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4356
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD58422680a0da597259d0d929df725506d
SHA1f4af26d54c67c5091ff4421c4af86cbe39fc293d
SHA256866d457ec8e81af434fc165307e2593b75140bb2b603aecc7c3cc1d7e6478f8d
SHA512c24e4c824a9d0a14863ec74b2a9f010e042b38e45d85ec2f8f0b763f80ab57551f68c59e54a148766d7b442f731606bd430501f3e14c5ff47f74f1fbcbbeddec
-
Filesize
2KB
MD588a20f952d8a5c248455c9e9cc31e693
SHA10cd7a9175398972f57e01c0f4f9585682eb09748
SHA2561daff283a5e35f7631759ff7aa390a0139ac026176f90ead77224b29987e645e
SHA5127295d2de32725b61978783774be99e152b244ef0b90c39dc359729482cf7c2a31cdcecbd92948fd20faf6f409752aefa1c7d9b612cab650e60dd01a410decd10
-
Filesize
344KB
MD56b1c9bfd99322686785ed3497ae2cddf
SHA1d241fc5587906e9e39b120421a279dc3c4a0eaf7
SHA25622b6389450c35087d9f97859d92fa5e295e12d839ef53968926c87b87e83bf3e
SHA51294e848c13945b546c9d69c5e9fe974ec4786c137696f09c92d7abed41e18056e004437ebee0d535252601f28a2694aa3f6abf9f60fdea8209a0cc6e0c290b5e1
-
Filesize
439KB
MD52956f9061ab953f5c93ce971105dbb07
SHA10bf3a109296e1a237c7afa0d0ec1c4317cc59fc9
SHA25615d45098faccc785facaa2381a4f8bf489e46bcc6661850722bd318d872645af
SHA512fb5e2ed1a6a9e2e80869979f4c8054a713c52f3d65814ea17a37eb7c7e33beea690c04a7fe45c10060483748fc9b3976da5fdf6d1ba818b29470551bb785d25d
-
Filesize
114KB
MD59a3be5cb8635e4df5189c9aaa9c1b3c0
SHA19a7ce80c8b4362b7c10294bb1551a6172e656f47
SHA256958f70959a70caf02c0063fe80f12c4d4d3f822a9fd640a6685c345d98708c26
SHA5125c538513eba7ebaf7028b924d992b4c32ca323ad44f7a31e21970ed6852ea8b54cf71b2f811e8bf97f2744ee151e001ea52ba43b61cd032cc5a4c886292aac65