Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe
-
Size
719KB
-
MD5
99b275b5cc5a6bb8d492490c6979bae9
-
SHA1
ab7301c148263996feaeff276bf9825be0d39659
-
SHA256
aecec29b477c1a6f99aa8c512cc3179ef577ce814f74dc87005407bdd1602601
-
SHA512
79022795c97a82b5737b63c169d33afeb3abf4b1b674b27a2b8b720468e1e736089987a8b2e6ddf2708a2b67d5ba2e74e10e440d98e8b6fe6422ef82f9b90469
-
SSDEEP
12288:UJv4sbmf230mGKBE6ONz7oCqqu5FP03W3LzO9cg8SjSIMaolh+mS:U1SlmGd6R3qu5FPAiLzARdSIMaN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/2864-51-0x0000000000400000-0x000000000059D000-memory.dmp modiloader_stage2 behavioral2/memory/2864-53-0x0000000000400000-0x000000000059D000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 456.exe -
Executes dropped EXE 3 IoCs
pid Process 1420 456.exe 2864 ¸´¼þ Sx_server.exe 4636 NOTEPAD.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\¸´¼þ Sx_server.jpg 456.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt ¸´¼þ Sx_server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¸´¼þ Sx_server.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1420 1316 JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe 83 PID 1316 wrote to memory of 1420 1316 JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe 83 PID 1316 wrote to memory of 1420 1316 JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe 83 PID 1420 wrote to memory of 2864 1420 456.exe 84 PID 1420 wrote to memory of 2864 1420 456.exe 84 PID 1420 wrote to memory of 2864 1420 456.exe 84 PID 1316 wrote to memory of 4636 1316 JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe 85 PID 1316 wrote to memory of 4636 1316 JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe 85 PID 1316 wrote to memory of 4636 1316 JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe 85 PID 2864 wrote to memory of 3988 2864 ¸´¼þ Sx_server.exe 86 PID 2864 wrote to memory of 3988 2864 ¸´¼þ Sx_server.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_99b275b5cc5a6bb8d492490c6979bae9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\456.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\456.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\program files\common files\microsoft shared\msinfo\¸´¼þ Sx_server.exe"C:\program files\common files\microsoft shared\msinfo\¸´¼þ Sx_server.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"4⤵PID:3988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NOTEPAD.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\NOTEPAD.EXE2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD5a8574aaf3427d0c468da1100fd1526ff
SHA1012fefa0bb040c2528ef7266d535f2fe5cbf7707
SHA25681bf66543e6ff717c9f26f0cf8740722f17ac175d1da3abe85a7dcab389459e8
SHA512039e1ac5b8c324fba4be5a80128a0764336e790969c2b7ae22e308a12aed47e20c4a647c53cef2b353a3cf952c8e9dfb4c7a8edf16d00980caf8bcf34459bb22
-
Filesize
634KB
MD573f2c3940d71ea34923e274b6935abfc
SHA10e79d8e82ccfeef2898b144188035cfde26616d4
SHA25606f3c70980a2c6553c046c526fa18f282adeaa660eeedd16b85c7cbd4e888fea
SHA5125b8ee88495cd14268923c0f4f64778c0ec0c9d435ec124e791fab21b59c9a98cdd78d47508a7b3ac3e5b4c071b4e894eff716cae8d9da1c594276bf430d04efe
-
Filesize
65KB
MD5c9f225f98574759e377bce6d87958c9c
SHA13a23ac5865ea5ac89d87b4219646a1cee5820ac1
SHA2567834f55bcff4d30d7b778bceea618cfd23cf4f184f7db6b74d1b49bbcf6c0560
SHA512d9ffd8ba019cde8e7d71b6c208f2b949e271527373458fee48e461e49ff096d32361d372a48aaa84b153847dd75c79a99e23f8fa450c888aae180bb3e2dc4c1b