Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 15:20
Behavioral task
behavioral1
Sample
fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe
-
Size
173KB
-
MD5
fc12d5b309f5090cc04ae5a8aea31c5a
-
SHA1
0fa6b9ab2032dc01e5a2881b8610af5dd08bec46
-
SHA256
123f5a6eb28a7e7936a67234374dbc4519cb1f96b1378af2883a51d6e605fb85
-
SHA512
3238cbe92132472138d4f432044bfb077f20c4cf3fc8be8c92c4b45c8ab80a7fb3b58f6f81f06c4c559b85de4f5865178eee730de46eeb72b63789e19310af04
-
SSDEEP
3072:dtDulZKksGzZjDDeqCe5ToU21kkH2ip0KuPk2afiMpltkrkbtNLWGtVeHnx:d6KksSrIU2ykH2ipsPnafFlerkb3Lrta
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "explorer.exe\"C:\\Windows\\srvinit.exe\"," srvinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Windows\\srvinit.exe\"" srvinit.exe -
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c83-4.dat modiloader_stage2 behavioral2/memory/4412-33-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 behavioral2/memory/2668-42-0x0000000000400000-0x0000000000432000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run srvinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\server = "C:\\Windows\\srvinit.exe" srvinit.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63} srvinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{05I41M56-QW07-U20F-YX8T-VB4U6TP4UX63}\StubPath = "\"C:\\Windows\\srvinit.exe\"" srvinit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2668 srvinit.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 srvinit.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\srvinit.exe fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe File opened for modification C:\Windows\srvinit.exe fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srvinit.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4412 fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe 4412 fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe 2668 srvinit.exe 2668 srvinit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2668 4412 fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe 83 PID 4412 wrote to memory of 2668 4412 fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe 83 PID 4412 wrote to memory of 2668 4412 fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe 83 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84 PID 2668 wrote to memory of 464 2668 srvinit.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\srvinit.exe"C:\Windows\srvinit.exe" \melt "C:\Users\Admin\AppData\Local\Temp\fc12d5b309f5090cc04ae5a8aea31c5a_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:464
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5fc12d5b309f5090cc04ae5a8aea31c5a
SHA10fa6b9ab2032dc01e5a2881b8610af5dd08bec46
SHA256123f5a6eb28a7e7936a67234374dbc4519cb1f96b1378af2883a51d6e605fb85
SHA5123238cbe92132472138d4f432044bfb077f20c4cf3fc8be8c92c4b45c8ab80a7fb3b58f6f81f06c4c559b85de4f5865178eee730de46eeb72b63789e19310af04