Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 03:10
Behavioral task
behavioral1
Sample
JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe
-
Size
71KB
-
MD5
9e0dc11a20dddea7609161f4bfc90075
-
SHA1
7485bd499852cabfdde9cf394dc40b9880d6264e
-
SHA256
4cf41d73160796b32f804dd429b2f991bbc0ef5968eaaca95a900d70fbd9bb19
-
SHA512
22d570ec098e1c6fe08a22d03d0d12b0e047eb1087ae1e49cf3cc41d5ab8d5aa6ebc1e3bbae18efeff6cbd0e4c38ce5f1a4ade90f228300d53fba5a342cb438f
-
SSDEEP
1536:k9qSmMABU5i7fG3U9HA4p2d1WF+De/y99RR9+HRO+CZ:GqSmMAffG3iHA4pI7D6y/ARO+C
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = ",C:\\Windows\\scvhost.exe" scvhost.exe -
Modiloader family
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral2/memory/4988-6-0x0000000030000000-0x0000000030035000-memory.dmp modiloader_stage2 behavioral2/memory/4704-7-0x0000000030000000-0x0000000030035000-memory.dmp modiloader_stage2 behavioral2/memory/4704-9-0x0000000030000000-0x0000000030035000-memory.dmp modiloader_stage2 behavioral2/memory/4704-12-0x0000000030000000-0x0000000030035000-memory.dmp modiloader_stage2 behavioral2/memory/4704-14-0x0000000030000000-0x0000000030035000-memory.dmp modiloader_stage2 behavioral2/memory/4704-17-0x0000000030000000-0x0000000030035000-memory.dmp modiloader_stage2 behavioral2/memory/4704-20-0x0000000030000000-0x0000000030035000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4704 scvhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\scvhost.exe" scvhost.exe -
resource yara_rule behavioral2/memory/4988-0-0x0000000030000000-0x0000000030035000-memory.dmp upx behavioral2/files/0x0009000000023ca9-3.dat upx behavioral2/memory/4988-6-0x0000000030000000-0x0000000030035000-memory.dmp upx behavioral2/memory/4704-7-0x0000000030000000-0x0000000030035000-memory.dmp upx behavioral2/memory/4704-9-0x0000000030000000-0x0000000030035000-memory.dmp upx behavioral2/memory/4704-12-0x0000000030000000-0x0000000030035000-memory.dmp upx behavioral2/memory/4704-14-0x0000000030000000-0x0000000030035000-memory.dmp upx behavioral2/memory/4704-17-0x0000000030000000-0x0000000030035000-memory.dmp upx behavioral2/memory/4704-20-0x0000000030000000-0x0000000030035000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\scvhost.exe JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe File opened for modification C:\Windows\scvhost.exe JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4704 scvhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4704 scvhost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4704 4988 JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe 82 PID 4988 wrote to memory of 4704 4988 JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe 82 PID 4988 wrote to memory of 4704 4988 JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe 82 PID 4704 wrote to memory of 3352 4704 scvhost.exe 55 PID 4704 wrote to memory of 3352 4704 scvhost.exe 55 PID 4704 wrote to memory of 3352 4704 scvhost.exe 55 PID 4704 wrote to memory of 3352 4704 scvhost.exe 55 PID 4704 wrote to memory of 3352 4704 scvhost.exe 55 PID 4704 wrote to memory of 3352 4704 scvhost.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9e0dc11a20dddea7609161f4bfc90075.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\scvhost.exe-bs3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD59e0dc11a20dddea7609161f4bfc90075
SHA17485bd499852cabfdde9cf394dc40b9880d6264e
SHA2564cf41d73160796b32f804dd429b2f991bbc0ef5968eaaca95a900d70fbd9bb19
SHA51222d570ec098e1c6fe08a22d03d0d12b0e047eb1087ae1e49cf3cc41d5ab8d5aa6ebc1e3bbae18efeff6cbd0e4c38ce5f1a4ade90f228300d53fba5a342cb438f