Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2025, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe
-
Size
1.0MB
-
MD5
56942163db21e0409b92fc16c5f40d03
-
SHA1
c92f50c8c3f425fa2a53242d4b2795f55afcb684
-
SHA256
7589ceea4574effa89e246b33c3660a1e1cc0ae80874b22207de4343511a372e
-
SHA512
b0f2250cc9e29b2961266affc98bc99e530f4303361a690b46536bcbaa28d9dcb432b897522eb9e843b894c313aba603ae5b42688d5ad2c340c3971c2d7ecdec
-
SSDEEP
24576:O9sFUm6PN/7+6Qsz5Y4nOcCCKQmXri2kGsdGbhkP:Y1m6PNT+6Qs9OchrmuP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/680-96-0x0000000000400000-0x00000000004D1000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation SCRAMB~1.EXE -
Executes dropped EXE 3 IoCs
pid Process 4348 1.exe 3612 SCRAMB~1.EXE 680 temp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\1.jpg JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCRAMB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4348 4272 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 83 PID 4272 wrote to memory of 4348 4272 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 83 PID 4272 wrote to memory of 4348 4272 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 83 PID 4348 wrote to memory of 3612 4348 1.exe 84 PID 4348 wrote to memory of 3612 4348 1.exe 84 PID 4348 wrote to memory of 3612 4348 1.exe 84 PID 3612 wrote to memory of 680 3612 SCRAMB~1.EXE 85 PID 3612 wrote to memory of 680 3612 SCRAMB~1.EXE 85 PID 3612 wrote to memory of 680 3612 SCRAMB~1.EXE 85 PID 680 wrote to memory of 444 680 temp.exe 86 PID 680 wrote to memory of 444 680 temp.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\program files\common files\microsoft shared\msinfo\1.exe"C:\program files\common files\microsoft shared\msinfo\1.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRAMB~1.EXE3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"5⤵PID:444
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
685KB
MD5cb91cdde00b2b14457452ce500a1464c
SHA155cb59431b6ef3674807685eaee850cbebca70a9
SHA2567fa395ea70bceace2ef09ce951f552037ee7be40e60d7a73c14f369c2f481881
SHA51294470f2135cfbc5d6c31b38906cac41b462c6c5ada0089cd51cdcf00a920ecf91aea7dc5e2ac3728586837b75b78ebd234ec31d7594b0f03d19df18f6d9bdd21
-
Filesize
1.0MB
MD58e96ae1689c8304b0e7e4471c59a4af4
SHA1ebb92e313266b1c3e46365a1760f059762fc6aaa
SHA256ec841c7c5be91900df380af0243c6454e5f3f085a29cea2e13817cb887d35fc9
SHA5129daec4d1053e154e0fa0621bf03edcdfc45227b4f9ee293dcacd5fc61884d55621d64e6c68b356c475f2d6445a769d52571625caf1aec3d3daff40bf10b0e10f
-
Filesize
737KB
MD514062d42b65c1ab7affd8c156e5e9244
SHA1459a296b77c98f3bf76166a0c7b85d83fd5bfa0d
SHA256279005932ed768eca5d8426f8b7905dc04a66527defafbe55d09d6352606f023
SHA51266632b2e0e694087a52db63b7a446543c01db20839ada59f258f801963b985363b13ace3438f52ccb8e4a7d8f5cdbc241afdabd4aee8cb1b3ecd210a3ef3686f