Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 07:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe
-
Size
204KB
-
MD5
0b611c2a068464b5e159c42a52323e8f
-
SHA1
90cb86e2e5795a8266b6a416f017fb8aa08454c0
-
SHA256
f016ca0df3328d1c9e1a700005a868e138be98b21e9057bb779ee46f1f41976b
-
SHA512
f6cee97f346e319b18d2703589df7e974dd1f464a87a04d3df9efc82efb8223473725b5f45aa4095d059afff9d80e0d6f1e88b1d06a39b3542d49f55cbb6d77a
-
SSDEEP
3072:IVLWUJOubym6q/iU0XrxIh1V/mxIPTB+7GBuZmr/xo7vpavphHD6q:gp6q/iU0Xr+hGATEaBuZKC7vYh9O
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 25 IoCs
resource yara_rule behavioral2/memory/2024-5-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/2024-6-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/2024-7-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/2024-8-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/2024-19-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-31-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-30-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-32-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-33-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-35-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-36-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-37-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-38-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-39-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-40-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-41-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-42-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-43-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-44-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-45-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-46-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-47-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-48-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-49-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 behavioral2/memory/3476-50-0x0000000000400000-0x000000000046D000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe -
Deletes itself 1 IoCs
pid Process 3476 javascheds.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SunJavaUpdateSched.lnk JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SunJavaUpdateSched.lnk JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SunJavaUpdateSched.lnk javascheds.exe -
Executes dropped EXE 2 IoCs
pid Process 1908 javascheds.exe 3476 javascheds.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: javascheds.exe File opened (read-only) \??\I: javascheds.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\setup\javascheds.exe JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe File opened for modification C:\Windows\SysWOW64\wins\setup\javascheds.exe JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4656 set thread context of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 1908 set thread context of 3476 1908 javascheds.exe 87 -
resource yara_rule behavioral2/memory/2024-2-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2024-3-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2024-4-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2024-5-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2024-6-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2024-7-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2024-8-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/2024-19-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-29-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-31-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-30-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-32-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-33-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-35-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-36-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-37-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-38-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-39-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-40-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-41-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-42-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-43-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-44-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-45-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-46-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-47-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-48-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-49-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/3476-50-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javascheds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javascheds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 2024 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 2024 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 1908 javascheds.exe 3476 javascheds.exe 3476 javascheds.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 4656 wrote to memory of 2024 4656 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 83 PID 2024 wrote to memory of 1908 2024 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 85 PID 2024 wrote to memory of 1908 2024 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 85 PID 2024 wrote to memory of 1908 2024 JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe 85 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 1908 wrote to memory of 3476 1908 javascheds.exe 87 PID 3476 wrote to memory of 2168 3476 javascheds.exe 88 PID 3476 wrote to memory of 2168 3476 javascheds.exe 88 PID 3476 wrote to memory of 2168 3476 javascheds.exe 88 PID 3476 wrote to memory of 3228 3476 javascheds.exe 89 PID 3476 wrote to memory of 3228 3476 javascheds.exe 89 PID 3476 wrote to memory of 3228 3476 javascheds.exe 89 PID 3476 wrote to memory of 4876 3476 javascheds.exe 90 PID 3476 wrote to memory of 4876 3476 javascheds.exe 90 PID 3476 wrote to memory of 4876 3476 javascheds.exe 90 PID 3228 wrote to memory of 4440 3228 cmd.exe 94 PID 3228 wrote to memory of 4440 3228 cmd.exe 94 PID 3228 wrote to memory of 4440 3228 cmd.exe 94 PID 2168 wrote to memory of 3756 2168 cmd.exe 95 PID 2168 wrote to memory of 3756 2168 cmd.exe 95 PID 2168 wrote to memory of 3756 2168 cmd.exe 95 PID 4876 wrote to memory of 1492 4876 cmd.exe 96 PID 4876 wrote to memory of 1492 4876 cmd.exe 96 PID 4876 wrote to memory of 1492 4876 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b611c2a068464b5e159c42a52323e8f.exe2⤵
- Checks computer location settings
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\wins\setup\javascheds.exe"C:\Windows\system32\wins\setup\javascheds.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\wins\setup\javascheds.exeC:\Windows\SysWOW64\wins\setup\javascheds.exe4⤵
- Deletes itself
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEditControl.dll5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEditControl.dll6⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/tebedit.ocx5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/tebedit.ocx6⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEdit4ISB.dll5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEdit4ISB.dll6⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD50b611c2a068464b5e159c42a52323e8f
SHA190cb86e2e5795a8266b6a416f017fb8aa08454c0
SHA256f016ca0df3328d1c9e1a700005a868e138be98b21e9057bb779ee46f1f41976b
SHA512f6cee97f346e319b18d2703589df7e974dd1f464a87a04d3df9efc82efb8223473725b5f45aa4095d059afff9d80e0d6f1e88b1d06a39b3542d49f55cbb6d77a