Analysis
-
max time kernel
93s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 05:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe
-
Size
656KB
-
MD5
0acfb5fa4930eef3bdae0409543759f5
-
SHA1
6bacc676e376aff10cad7681d9ff8cd927bca869
-
SHA256
d7042a68c14f2a0adf2db66cd2874c185506ad4d9000d24aaec02b20101026cb
-
SHA512
05b7a35ff7e99c4686b04d2b15f91026ec4e288f5bf2a26305b24f144612f34a50f453df3e545049ffe3fa5dab18d15b5ca37a3841f4526eff9109816efeabbb
-
SSDEEP
12288:swIy2lZsNtgGRg71xTph5G1rI9eVNZF3Z4mxxTDqVTVOCy:s3y2lZyavV5G189ePZQmX6VTzy
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023ce4-64.dat modiloader_stage2 behavioral2/memory/1920-67-0x0000000000400000-0x00000000004B8000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1920 s.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Fiele Ps.txt s.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3600 wrote to memory of 1920 3600 JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe 85 PID 3600 wrote to memory of 1920 3600 JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe 85 PID 3600 wrote to memory of 1920 3600 JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe 85 PID 1920 wrote to memory of 4912 1920 s.exe 86 PID 1920 wrote to memory of 4912 1920 s.exe 86 PID 1920 wrote to memory of 4912 1920 s.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0acfb5fa4930eef3bdae0409543759f5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\system32\mstsc.exe"3⤵PID:4912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD533deff2d54ed97451fb6c1e3a2b82c78
SHA17d61f8796680fe66709c111fff9979ecbe432f2b
SHA2562a5ebacb2916126bd362cc0d2641942545e40709f59a3729ee08f57c5cc8e1f7
SHA512e315dfba60cf014ad66fdbeb4a58e95f0bc052a6a956a56a5875f14c59ea7e62378c389fee6fbdbf682cdf3b6270870398a69acd942d03493d82a2a34aaf4767