Analysis
-
max time kernel
92s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 00:47
Behavioral task
behavioral1
Sample
JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe
-
Size
260KB
-
MD5
69393c50233ddcc11b5433c433ef2e83
-
SHA1
67e1ecb8de6c0da75c17d95d134a60638b0d0593
-
SHA256
74cb2839c54e4f92fd2af2572cae88f0c397cb910adcd4ff9b77c0f729f3ea89
-
SHA512
3167e061efd3e8e756c58742f806349b39d748af77a2e8ad3974c9d82e0e4a753ee280a7531348e5f31164330d1e2c6b3b8d3ef201b9a4aaea8cdec3d5e719d8
-
SSDEEP
3072:W7uYFWK7AH/ilDu0kcGBVSavWSecVH40DIehPDDaNu6yH314d8iPN7fC9CZxATf:WabKKMDu/cGBoavFe2DXDrnl4d8wcc
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3268-7-0x0000000000400000-0x0000000000448000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe -
Executes dropped EXE 2 IoCs
pid Process 3976 sat.exe 1620 sat.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3976 set thread context of 1620 3976 sat.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3976 sat.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3268 wrote to memory of 3976 3268 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 83 PID 3268 wrote to memory of 3976 3268 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 83 PID 3268 wrote to memory of 3976 3268 JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe 83 PID 3976 wrote to memory of 1620 3976 sat.exe 84 PID 3976 wrote to memory of 1620 3976 sat.exe 84 PID 3976 wrote to memory of 1620 3976 sat.exe 84 PID 3976 wrote to memory of 1620 3976 sat.exe 84 PID 3976 wrote to memory of 1620 3976 sat.exe 84 PID 3976 wrote to memory of 1620 3976 sat.exe 84 PID 3976 wrote to memory of 1620 3976 sat.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69393c50233ddcc11b5433c433ef2e83.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\sat.exe"C:\Users\Admin\AppData\Local\Temp\sat.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\sat.exeC:\Users\Admin\AppData\Local\Temp\sat.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD50c85a55334e51a515608333335c1f8f7
SHA17c2e5e2ea015a751f4a58eb9d99faaa87055c8ae
SHA256ae5f1935502d49a771533618f8cad58c6b2cdbe67c8728d70d05ec92167bab02
SHA512bf1f1b40a496782040247de75891772b64d7e9d55e92a4ae44963d54b9b4b415ab1315d186b5bf51f3e52b4d2372bf843c9483a9191707a39b35e3dc8e2f1d08