Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe
-
Size
244KB
-
MD5
c650d943b26950830ff91945dadafa1f
-
SHA1
3e8065836d7018e684969946afb03573a7beb688
-
SHA256
2beb5d46c94486a211643653d65d1a1952b3ef0983e74d1e4bf4476fa90833ce
-
SHA512
f9c125dbb56d6c9e0644541f471da8b6aab58de9753b7994610235a2f6afcf7b7a608efc0fbda402e7be757dc0caa70fba20090170829164f6fa6df8384aa2fc
-
SSDEEP
6144:AaAbo5uA86xeI/s5tD4mMVohX7cla9PUCrzXF:AfbIkXIlaTrz1
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 11 IoCs
resource yara_rule behavioral1/memory/2684-28-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-30-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-26-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-24-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-22-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-34-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-35-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-39-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-40-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-52-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 behavioral1/memory/2976-96-0x0000000000400000-0x000000000040F000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2544 met start.exe 2996 met start.exe 2976 met start.exe -
Loads dropped DLL 2 IoCs
pid Process 2684 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 2684 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\met start.exe\"" met start.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\met start.exe\"" JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 met start.exe File opened for modification \??\PhysicalDrive0 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2660 set thread context of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2700 set thread context of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2544 set thread context of 2996 2544 met start.exe 34 PID 2996 set thread context of 2976 2996 met start.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language met start.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language met start.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language met start.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 2544 met start.exe 2996 met start.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2660 wrote to memory of 2700 2660 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 31 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2700 wrote to memory of 2684 2700 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 32 PID 2684 wrote to memory of 2544 2684 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 33 PID 2684 wrote to memory of 2544 2684 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 33 PID 2684 wrote to memory of 2544 2684 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 33 PID 2684 wrote to memory of 2544 2684 JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe 33 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2544 wrote to memory of 2996 2544 met start.exe 34 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35 PID 2996 wrote to memory of 2976 2996 met start.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c650d943b26950830ff91945dadafa1f.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\met start.exe"C:\Users\Admin\AppData\Roaming\met start.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\met start.exe"C:\Users\Admin\AppData\Roaming\met start.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\met start.exe"C:\Users\Admin\AppData\Roaming\met start.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2976
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5c650d943b26950830ff91945dadafa1f
SHA13e8065836d7018e684969946afb03573a7beb688
SHA2562beb5d46c94486a211643653d65d1a1952b3ef0983e74d1e4bf4476fa90833ce
SHA512f9c125dbb56d6c9e0644541f471da8b6aab58de9753b7994610235a2f6afcf7b7a608efc0fbda402e7be757dc0caa70fba20090170829164f6fa6df8384aa2fc