Analysis
-
max time kernel
92s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2025, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe
-
Size
706KB
-
MD5
581599111559af39d587c0a4ad7aec3c
-
SHA1
d4e5df9dbbb4ebc771b8335447db604e8f2fcd1f
-
SHA256
4bcbf3e1b8db650034045a3051c43678b90401525bb002c11b797b099e633166
-
SHA512
7664b7a8caf5f6088c733e71a0c62fd2462700e0d2dc68f95d0ef83701b3773156bd95afcf5a0c60a8afa4fdc925a487a6bdd1600067af686352749d900757a0
-
SSDEEP
12288:yrnDkr9EJIoNEiFEtCNVPMNbEziKR/60LF3Z4mxxYLPOwjLNkf4:ybAGhNEtCN2mjRPLQmXYawXNkg
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4344-61-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe -
Executes dropped EXE 1 IoCs
pid Process 4344 0.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2644 4928 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4344 4928 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 87 PID 4928 wrote to memory of 4344 4928 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 87 PID 4928 wrote to memory of 4344 4928 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 87 PID 4344 wrote to memory of 4168 4344 0.exe 88 PID 4344 wrote to memory of 4168 4344 0.exe 88 PID 4344 wrote to memory of 4168 4344 0.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 3322⤵
- Program crash
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\0.exe"C:\Users\Admin\AppData\Local\Temp\0.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:4168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4928 -ip 49281⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD52911f6bcf6fd263da5b002490eda4c23
SHA1a3722256d39831c40bf96fb8c44a9f59edc61c8c
SHA25674a76cdefbbd32339a31e45a5ffa87df15e92e03902de528a1c5c0dcd25f2b2e
SHA51229f9d0e8dc376a1574fe00cd8b9ac973779a7744e8cf668bc07ba4b7919baf49f4874f2033830519d13c7cd2f1cf668fa8c089c09accff0d66850d0a872b710f