Analysis
-
max time kernel
143s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 15:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe
-
Size
130KB
-
MD5
6d9be36023a5d2cc30c66c05c86ef4bd
-
SHA1
bb71eb14d011afdc9435e14b40514c1afe5f1c56
-
SHA256
fe18f123ca5ec2b286ba646d8ab6b68311e746388ef9ce4fdf66883d8ac54968
-
SHA512
cf3e7fae0c12b0f45bbc18ca760f5305971cfbe9784eeb254fab71d0aa5dff542aae0aad9ed40869f2af6d248d460d8aef736c8cbe0a26a7f825586c292e5e4a
-
SSDEEP
3072:dh/Pamm3jYxtRLj4QXT/adWCTKkHidyiEaxZnUjy15Y3eHdX9XRDPou/+wzM:jntuYzRLzSdWuK4idyibxZUw5bdbPooL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SHELL = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Local\\KB8421346\\KB8421346.exe\"" svchost.exe -
Modiloader family
-
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral1/memory/1684-5-0x0000000000400000-0x00000000006B3000-memory.dmp modiloader_stage2 behavioral1/memory/2272-18-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-19-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-17-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/1684-9-0x0000000000400000-0x00000000006B3000-memory.dmp modiloader_stage2 behavioral1/memory/2272-21-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-27-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-28-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-33-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-37-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-41-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-45-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-49-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-54-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-58-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-62-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-66-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 behavioral1/memory/2272-70-0x0000000000370000-0x0000000000623000-memory.dmp modiloader_stage2 -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB8421346 = "\"C:\\Users\\Admin\\AppData\\Local\\KB8421346\\KB8421346.exe\"" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KB8421346 = "\"C:\\Users\\Admin\\AppData\\Local\\KB8421346\\KB8421346.exe\"" svchost.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" svchost.exe -
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
pid Process 2272 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\KB8421346 = "\"C:\\Users\\Admin\\AppData\\Local\\KB8421346\\KB8421346.exe\"" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\KB8421346 = "\"C:\\Users\\Admin\\AppData\\Local\\KB8421346\\KB8421346.exe\"" svchost.exe -
resource yara_rule behavioral1/memory/1684-2-0x0000000000400000-0x00000000006B3000-memory.dmp upx behavioral1/memory/1684-5-0x0000000000400000-0x00000000006B3000-memory.dmp upx behavioral1/memory/2272-18-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-14-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-19-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-17-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/1684-9-0x0000000000400000-0x00000000006B3000-memory.dmp upx behavioral1/memory/2272-21-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-27-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-28-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-33-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-37-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-41-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-45-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-49-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-54-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-58-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-62-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-66-0x0000000000370000-0x0000000000623000-memory.dmp upx behavioral1/memory/2272-70-0x0000000000370000-0x0000000000623000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe 2272 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2272 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 30 PID 1684 wrote to memory of 2272 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 30 PID 1684 wrote to memory of 2272 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 30 PID 1684 wrote to memory of 2272 1684 JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\svchost.exepath<<C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d9be36023a5d2cc30c66c05c86ef4bd.exe>>path2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Deletes itself
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD56d9be36023a5d2cc30c66c05c86ef4bd
SHA1bb71eb14d011afdc9435e14b40514c1afe5f1c56
SHA256fe18f123ca5ec2b286ba646d8ab6b68311e746388ef9ce4fdf66883d8ac54968
SHA512cf3e7fae0c12b0f45bbc18ca760f5305971cfbe9784eeb254fab71d0aa5dff542aae0aad9ed40869f2af6d248d460d8aef736c8cbe0a26a7f825586c292e5e4a