Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 05:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe
-
Size
127KB
-
MD5
62e47b54734e7a9a05bffda45df00922
-
SHA1
6345bea5765762eeb2b10eecb37a3ac6f945ab45
-
SHA256
ee9435588703e9945fa550b48a458c99720c8c3653c2b16e4a5c236965368456
-
SHA512
41d876592132d3f8b3ead23681dba06b8cc0c67381cb5d1b2a199b7dbe785ff28d6998b41a3e4c913b9f24ed70154bad1d095482e7b18a8ea3bc332eafd1bba9
-
SSDEEP
3072:T4uvYl5yjK8RNbFUpbtVmxoPodf4qGP21ouv4Miu:T4kYXylkVtVKM+kPYow4M
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SHELL = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\KB6394173\\KB6394173.exe\"" svchost.exe -
Modiloader family
-
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral2/memory/212-5-0x0000000000400000-0x0000000000814000-memory.dmp modiloader_stage2 behavioral2/memory/1564-17-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-18-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-20-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/212-12-0x0000000000400000-0x0000000000814000-memory.dmp modiloader_stage2 behavioral2/memory/1564-22-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-28-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-29-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-33-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-38-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-42-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-46-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-50-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-54-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-59-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-63-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-67-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 behavioral2/memory/1564-71-0x0000000000260000-0x0000000000674000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB6394173 = "\"C:\\Users\\Admin\\AppData\\Local\\KB6394173\\KB6394173.exe\"" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB6394173 = "\"C:\\Users\\Admin\\AppData\\Local\\KB6394173\\KB6394173.exe\"" svchost.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 1564 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KB6394173 = "\"C:\\Users\\Admin\\AppData\\Local\\KB6394173\\KB6394173.exe\"" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KB6394173 = "\"C:\\Users\\Admin\\AppData\\Local\\KB6394173\\KB6394173.exe\"" svchost.exe -
resource yara_rule behavioral2/memory/212-2-0x0000000000400000-0x0000000000814000-memory.dmp upx behavioral2/memory/212-5-0x0000000000400000-0x0000000000814000-memory.dmp upx behavioral2/memory/1564-17-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-18-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-20-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-15-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/212-12-0x0000000000400000-0x0000000000814000-memory.dmp upx behavioral2/memory/1564-22-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-28-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-29-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-33-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-38-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-42-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-46-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-50-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-54-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-59-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-63-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-67-0x0000000000260000-0x0000000000674000-memory.dmp upx behavioral2/memory/1564-71-0x0000000000260000-0x0000000000674000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe 1564 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 1564 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 83 PID 212 wrote to memory of 1564 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 83 PID 212 wrote to memory of 1564 212 JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\svchost.exepath<<C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62e47b54734e7a9a05bffda45df00922.exe>>path2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD562e47b54734e7a9a05bffda45df00922
SHA16345bea5765762eeb2b10eecb37a3ac6f945ab45
SHA256ee9435588703e9945fa550b48a458c99720c8c3653c2b16e4a5c236965368456
SHA51241d876592132d3f8b3ead23681dba06b8cc0c67381cb5d1b2a199b7dbe785ff28d6998b41a3e4c913b9f24ed70154bad1d095482e7b18a8ea3bc332eafd1bba9