Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 00:47
Behavioral task
behavioral1
Sample
JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe
-
Size
260KB
-
MD5
69393c50233ddcc11b5433c433ef2e83
-
SHA1
67e1ecb8de6c0da75c17d95d134a60638b0d0593
-
SHA256
74cb2839c54e4f92fd2af2572cae88f0c397cb910adcd4ff9b77c0f729f3ea89
-
SHA512
3167e061efd3e8e756c58742f806349b39d748af77a2e8ad3974c9d82e0e4a753ee280a7531348e5f31164330d1e2c6b3b8d3ef201b9a4aaea8cdec3d5e719d8
-
SSDEEP
3072:W7uYFWK7AH/ilDu0kcGBVSavWSecVH40DIehPDDaNu6yH314d8iPN7fC9CZxATf:WabKKMDu/cGBoavFe2DXDrnl4d8wcc
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2780-8-0x0000000000400000-0x0000000000448000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2948 sat.exe 2128 sat.exe -
Loads dropped DLL 3 IoCs
pid Process 2780 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 2780 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 2948 sat.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2948 set thread context of 2128 2948 sat.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2948 sat.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2948 2780 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 30 PID 2780 wrote to memory of 2948 2780 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 30 PID 2780 wrote to memory of 2948 2780 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 30 PID 2780 wrote to memory of 2948 2780 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 30 PID 2948 wrote to memory of 2128 2948 sat.exe 31 PID 2948 wrote to memory of 2128 2948 sat.exe 31 PID 2948 wrote to memory of 2128 2948 sat.exe 31 PID 2948 wrote to memory of 2128 2948 sat.exe 31 PID 2948 wrote to memory of 2128 2948 sat.exe 31 PID 2948 wrote to memory of 2128 2948 sat.exe 31 PID 2948 wrote to memory of 2128 2948 sat.exe 31 PID 2948 wrote to memory of 2128 2948 sat.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\sat.exe"C:\Users\Admin\AppData\Local\Temp\sat.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\sat.exeC:\Users\Admin\AppData\Local\Temp\sat.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD50c85a55334e51a515608333335c1f8f7
SHA17c2e5e2ea015a751f4a58eb9d99faaa87055c8ae
SHA256ae5f1935502d49a771533618f8cad58c6b2cdbe67c8728d70d05ec92167bab02
SHA512bf1f1b40a496782040247de75891772b64d7e9d55e92a4ae44963d54b9b4b415ab1315d186b5bf51f3e52b4d2372bf843c9483a9191707a39b35e3dc8e2f1d08