Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe
-
Size
237KB
-
MD5
1c0ee75595c06ee92f829fbf06710198
-
SHA1
7d90b75f2fa732511b4f8459dc1e91ec8944f9e4
-
SHA256
d1b089f79f28d32676832588bf3b7ce2e8cad71f23f84544066cb9e85c792669
-
SHA512
86ada2872cb95d2133b3db0dfa1a05ceb32c68c2c4a1f4225173e96f3793d9f4c7628d8dcb6a963690dafa0d97487037b3d2e3d87d092b069e3b5f29059a55a0
-
SSDEEP
6144:UfVqfF+Nx6wk7tl7/kRUqBVyv3W/MMwohDewIw:wSQ2dhu0M7qw
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2292-35-0x0000000000400000-0x000000000047E000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1692 Setup.exe 2292 ade.exe -
Loads dropped DLL 9 IoCs
pid Process 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 1692 Setup.exe 1692 Setup.exe 1692 Setup.exe 1692 Setup.exe 1692 Setup.exe 2292 ade.exe 2292 ade.exe 2292 ade.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ade.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 604 wrote to memory of 1692 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 31 PID 604 wrote to memory of 1692 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 31 PID 604 wrote to memory of 1692 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 31 PID 604 wrote to memory of 1692 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 31 PID 604 wrote to memory of 1692 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 31 PID 604 wrote to memory of 1692 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 31 PID 604 wrote to memory of 1692 604 JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe 31 PID 1692 wrote to memory of 2292 1692 Setup.exe 32 PID 1692 wrote to memory of 2292 1692 Setup.exe 32 PID 1692 wrote to memory of 2292 1692 Setup.exe 32 PID 1692 wrote to memory of 2292 1692 Setup.exe 32 PID 1692 wrote to memory of 2292 1692 Setup.exe 32 PID 1692 wrote to memory of 2292 1692 Setup.exe 32 PID 1692 wrote to memory of 2292 1692 Setup.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c0ee75595c06ee92f829fbf06710198.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ade.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ade.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD57c26e6695100d65f74dd4721a31f1e03
SHA1c16e59d86420898e2fad1fd3ac80b4129fb4d72c
SHA2564a7953a1b570493bf44316c936ade1a97f7068cc5a0a1758f9b117d9817b6d1b
SHA5120e04ee7615db7118e5309e9fd556c4b77e0276fad54ea011ad8aac70457b7d2286e5b3491b171aa52e5bc2fa1570ef3597708a7115ff0d166382051ae37f97e2
-
Filesize
204KB
MD581debcf35a5b32c1e948a609c7ee7f85
SHA127b3995a7e660c4818a9128ec793fa5204853cee
SHA256a38801fd2e91d91605e1f66c273e84ed57681fb6405e0526f54bddde71bcaaeb
SHA512527690d2f9ab802da7d67f0d80cd3f985a92d418d50f257d43830af3989955fcdc7013c59450ec15fe47453dbc81148044cd1cb623716adae9d2a55a5992c479