Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 04:50
Behavioral task
behavioral1
Sample
JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe
-
Size
43KB
-
MD5
054e3fce00f7c296a7b33aaf7259859f
-
SHA1
d8ca97a1e897cc3df468790f242fffe2c6f5749e
-
SHA256
01db0c248f2f1a90d746f5e51402b1c87769e169cbb9afdb01705a5e9611d6d9
-
SHA512
11bd7caea52118633a2383a4763dcfbb53eeae09c4f2ae60ae3045e0c6584c5f6ae69dada152ea341cae3692b85a1b46ab251e0f887c4d52d34e8f126a074863
-
SSDEEP
768:d2uRm5u9883lr294jrUyR8Ac8k6YkcqAOTC5J8cIlSx5E9AqWiDgtQbr:dquPxjR1caQ3IC5J8cxRir
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 14 IoCs
resource yara_rule behavioral2/memory/5020-10-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-11-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-13-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-14-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-15-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-16-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-17-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-18-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-19-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-20-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-21-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-22-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-23-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 behavioral2/memory/4328-24-0x0000000000400000-0x0000000000422000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe -
Executes dropped EXE 1 IoCs
pid Process 4328 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LOCAL = "C:\\Users\\Admin\\Documents\\Services\\svchost.exe" svchost.exe -
resource yara_rule behavioral2/memory/5020-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x0007000000023c9a-5.dat upx behavioral2/memory/5020-10-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-11-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-13-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-14-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-15-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-16-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-17-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-18-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-19-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-20-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-21-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-22-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-23-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4328-24-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe 4328 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4328 5020 JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe 82 PID 5020 wrote to memory of 4328 5020 JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe 82 PID 5020 wrote to memory of 4328 5020 JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_054e3fce00f7c296a7b33aaf7259859f.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\Documents\Services\svchost.exe"C:\Users\Admin\Documents\Services\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5054e3fce00f7c296a7b33aaf7259859f
SHA1d8ca97a1e897cc3df468790f242fffe2c6f5749e
SHA25601db0c248f2f1a90d746f5e51402b1c87769e169cbb9afdb01705a5e9611d6d9
SHA51211bd7caea52118633a2383a4763dcfbb53eeae09c4f2ae60ae3045e0c6584c5f6ae69dada152ea341cae3692b85a1b46ab251e0f887c4d52d34e8f126a074863