Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 10:36
Behavioral task
behavioral1
Sample
JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe
-
Size
1.0MB
-
MD5
a77bddc23470b26fb82a457f6efe485b
-
SHA1
402f44eb3b3c6b4ba3f4ae0a9565393147294614
-
SHA256
71cef093daa652359ac1e230499f18ce635b72dab461cee8e7bd3e8f7329eb15
-
SHA512
4fe675d255c8c2f5627dacf0406becf3d9918e6999a4957c7b6d80be2d400f7724ec55b5a1628d02161f8290ab8a89624db56cb7247decc7278c49fba2557153
-
SSDEEP
24576:RyngFg9MVEQdB0Z/Ip/XBc950hpi2QiGB2bb2NLeOC5UhKgbc96x:hFlVlB0Z/IpPqvD2Mib2heOAU6g
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral2/memory/5012-16-0x0000000000400000-0x00000000005E7000-memory.dmp modiloader_stage2 behavioral2/memory/5012-20-0x0000000000400000-0x00000000005E7000-memory.dmp modiloader_stage2 behavioral2/memory/5068-25-0x0000000000400000-0x00000000005E7000-memory.dmp modiloader_stage2 behavioral2/memory/5068-27-0x0000000000400000-0x00000000005E7000-memory.dmp modiloader_stage2 behavioral2/memory/5012-28-0x0000000000400000-0x00000000005E7000-memory.dmp modiloader_stage2 behavioral2/memory/5068-29-0x0000000000400000-0x00000000005E7000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe -
Executes dropped EXE 2 IoCs
pid Process 5012 240621531.exe 5068 360se.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5012 240621531.exe 5068 360se.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\360se.exe 240621531.exe File opened for modification C:\Program Files\360se.exe 240621531.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240621531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360se.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 760 JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe 760 JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 760 wrote to memory of 5012 760 JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe 83 PID 760 wrote to memory of 5012 760 JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe 83 PID 760 wrote to memory of 5012 760 JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe 83 PID 5012 wrote to memory of 5068 5012 240621531.exe 84 PID 5012 wrote to memory of 5068 5012 240621531.exe 84 PID 5012 wrote to memory of 5068 5012 240621531.exe 84 PID 5012 wrote to memory of 3712 5012 240621531.exe 85 PID 5012 wrote to memory of 3712 5012 240621531.exe 85 PID 5012 wrote to memory of 3712 5012 240621531.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a77bddc23470b26fb82a457f6efe485b.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\240621531.exe"C:\Users\Admin\AppData\Local\Temp\240621531.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files\360se.exe"C:\Program Files\360se.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\240621531.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
844KB
MD5bed0d87c86a757b88b617c79fb198f36
SHA177bf337b8aa983710db9a4742db6cf869a164d4b
SHA2562f732666f2d8010f2fcd9b7e27a6c35430a7133ec53ca8e42f022220a645c67b
SHA5122603ecac88c5f5d01b9d310cd2cf07d9cf01d5f0ff8d09c574e9aaf32fe97ab31feb1625f70a5346e1a5aa41736ec26220425ac5d7e7f75ab1aae9c5e7479809