Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe
-
Size
293KB
-
MD5
95d8f2ce6cd34a7189085298c5b7c602
-
SHA1
a00a8d17bcd095bcd412ee4498fe1132a13478c1
-
SHA256
32e7012c274784d1837bc9b77430d28067d95fcdee5884d1f23a9fc373a89e00
-
SHA512
9e597be36cbb4186141b1ccc7b87b5aea6cb0dcb16a2a656f41814e20e441812b5b5225403ca8a1962b074703d2f532732068230b0bff02972a9c93f161317da
-
SSDEEP
6144:HY/XgvZX4NeCpyzStZ32QUf0b3MgZmpPpO:+I4NhdGDq8gopRO
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "userinit.exe,C:\\Windows\\svchosts.exe" svchosts.exe -
Modiloader family
-
ModiLoader Second Stage 15 IoCs
resource yara_rule behavioral1/memory/2560-19-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-36-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-37-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-38-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-39-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-40-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-41-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-45-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-46-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-47-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-48-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-49-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-50-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-51-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 behavioral1/memory/292-53-0x0000000030000000-0x0000000030039000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2560 svchost.exe 292 svchosts.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchosts = "C:\\Windows\\svchosts.exe" svchosts.exe -
resource yara_rule behavioral1/files/0x0008000000016d4a-8.dat upx behavioral1/memory/2560-11-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/2560-19-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-36-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-37-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-38-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-39-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-40-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-41-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-45-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-46-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-47-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-48-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-49-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-50-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-51-0x0000000030000000-0x0000000030039000-memory.dmp upx behavioral1/memory/292-53-0x0000000030000000-0x0000000030039000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchosts.exe svchost.exe File opened for modification C:\Windows\svchosts.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe Token: SeShutdownPrivilege 2640 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 292 svchosts.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe 2640 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 292 svchosts.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2560 2016 JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe 30 PID 2016 wrote to memory of 2560 2016 JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe 30 PID 2016 wrote to memory of 2560 2016 JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe 30 PID 2016 wrote to memory of 2560 2016 JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe 30 PID 2560 wrote to memory of 292 2560 svchost.exe 31 PID 2560 wrote to memory of 292 2560 svchost.exe 31 PID 2560 wrote to memory of 292 2560 svchost.exe 31 PID 2560 wrote to memory of 292 2560 svchost.exe 31 PID 292 wrote to memory of 1288 292 svchosts.exe 21 PID 292 wrote to memory of 1288 292 svchosts.exe 21 PID 292 wrote to memory of 1288 292 svchosts.exe 21 PID 292 wrote to memory of 1288 292 svchosts.exe 21 PID 292 wrote to memory of 1288 292 svchosts.exe 21 PID 292 wrote to memory of 1288 292 svchosts.exe 21 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95d8f2ce6cd34a7189085298c5b7c602.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\svchosts.exe-bs4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:292
-
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5a0d693d09312b0f303d0ddb8eb855a16
SHA1258ba24c945fc8c28a9e557289f06eb277549ef8
SHA256f402eb39de2d7b7898b4514f903bae8da5b921f63b97f21448671b6931188df9
SHA51244744bfde05fae31e9ec1cd90ec755b39a5f3fd3208292617eaaa27216e191790783442e59883580bedce5e8f8ca95792b92491880ede5677819c4f580fd5798