Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe
-
Size
57KB
-
MD5
f3e0c7308f933365b61bb899ec2f2c43
-
SHA1
e1c651107b06ded92183b27e349a2e403574ad31
-
SHA256
ce4625b42cf8f73d54b9c511fda207b68854debd8f2340d1d76113d9c03e893a
-
SHA512
48407def86dccb9a570d156f64542af7371d11d7c0b22ec4815041cb940df38eeb7225b376e766356c7e1a6dcf7ac7b0554eb3ca1ec9628e5f9d29723df0653f
-
SSDEEP
768:1IRbFW5xQO+/JVHRo71DuSV7pNzkoT7wxeu5qBcE7JhC4z/3KKnDw239q+/bZ43i:OsqFtRq1DuS5zhwxeuc5jzyPGmi
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3216-3-0x0000000010000000-0x0000000010021000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.dll f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3216 set thread context of 4144 3216 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3216 wrote to memory of 4144 3216 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 82 PID 3216 wrote to memory of 4144 3216 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 82 PID 3216 wrote to memory of 4144 3216 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 82 PID 3216 wrote to memory of 4144 3216 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 82 PID 3216 wrote to memory of 4144 3216 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 82 PID 4144 wrote to memory of 4288 4144 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 83 PID 4144 wrote to memory of 4288 4144 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 83 PID 4144 wrote to memory of 4288 4144 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 83 PID 4144 wrote to memory of 3852 4144 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 84 PID 4144 wrote to memory of 3852 4144 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 84 PID 4144 wrote to memory of 3852 4144 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 84 PID 4288 wrote to memory of 3192 4288 cmd.exe 87 PID 4288 wrote to memory of 3192 4288 cmd.exe 87 PID 4288 wrote to memory of 3192 4288 cmd.exe 87 PID 3852 wrote to memory of 404 3852 cmd.exe 88 PID 3852 wrote to memory of 404 3852 cmd.exe 88 PID 3852 wrote to memory of 404 3852 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 404 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240612000_install.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Windows\system32\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.dll,InstallSB NtmsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\240612453_selfdel.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\attrib.exeattrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:404
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5011d37e506cf2e584ad5e2669a1f09d3
SHA144b0ade138e4d2bc86afabb36f990a83b85ae4b4
SHA25657e7e06bbfd3daf4deeddb37c34a30a13e6253cc0ff9cc9a7c042333f2109af9
SHA51289dac1542da68368aceff596428fbdc5d7779453cf7072e91eeb2889c86301560ef320aa535b7406670400cc64c5e3feff64431309fed31f1a8da6915ef6599e
-
Filesize
346B
MD56aa0fc0984968a6450e1dccbd6ad32ac
SHA1e4323010a8845ca57028be8f608250f71a25d0c1
SHA256ddec168c1d7863694646db0916cb02e8a9b332da73f2e108959dd7931022fe33
SHA512fef18149102aac942fe0ed814e6bf1e5ac0d48e86dc6513f7aee242531c7e4aef81feb8ae19486ee6f184001a3295ec1280a56a26804a185c767ab54c8e7416e
-
Filesize
20B
MD56551b8bf0ed982e15cc6022849e385f3
SHA154e502e3ebf60ee0dde3ed4eb556b742d0e22d5f
SHA256e339144e57071fd9db78cc24e9c7302fc7f09162bbe743ead6241d9fecbb7196
SHA51285a5cb9980020fada99aba6f8d727457ed676ab0ba206b4560f9168a6e6818f729ebf61882b28825bc2b9fb8f4113ed8f7393755c61f4d1ad05d4e4e8ebbc5e1