Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 12:00
Behavioral task
behavioral1
Sample
e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe
-
Size
294KB
-
MD5
e769fe5993c5e3a28432319d9e28cc45
-
SHA1
e6f2cb7d71596ee39a45cb1c2d2e87220795db2f
-
SHA256
abecee861e0311642dbcd28e48d10ff6673ad999f060db3d50a44f3c2558c730
-
SHA512
e0f7c3d257900d518ece398e6e1577298d15c399e45e3433630853f42bbc86f844869fd6cf59501dca50aff8b5689a797db2d9b9c907418021cf08ae0e98ab9a
-
SSDEEP
6144:i4hJQM/KsXoMDGWmV9Jw9DY7yQue0VkIdrbsbo/V3cYC9hUdkv4cwze7ebL0:iQJQIldSNqlYCeq/rYE/VMYC9hakxd1
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/1860-23-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral2/memory/632-24-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1860 winre.exe -
resource yara_rule behavioral2/memory/632-0-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/files/0x000100000000002b-10.dat upx behavioral2/memory/1860-15-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/4956-19-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/1860-23-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral2/memory/632-24-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\E: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\P: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\S: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\U: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\V: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\B: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\H: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\K: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\M: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\Y: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\I: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\L: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\N: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\O: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\Q: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\R: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\W: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\G: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\J: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\T: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\X: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\Z: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened for modification C:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File created F:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened for modification F:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_winre.exe winre.exe File opened for modification C:\Windows\SysWOW64\_winre.exe winre.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1860 set thread context of 4956 1860 winre.exe 101 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5000 4956 WerFault.exe 101 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 632 wrote to memory of 1860 632 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 100 PID 632 wrote to memory of 1860 632 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 100 PID 632 wrote to memory of 1860 632 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 100 PID 1860 wrote to memory of 4956 1860 winre.exe 101 PID 1860 wrote to memory of 4956 1860 winre.exe 101 PID 1860 wrote to memory of 4956 1860 winre.exe 101 PID 1860 wrote to memory of 4956 1860 winre.exe 101 PID 1860 wrote to memory of 4956 1860 winre.exe 101 PID 1860 wrote to memory of 3516 1860 winre.exe 102 PID 1860 wrote to memory of 3516 1860 winre.exe 102 PID 632 wrote to memory of 2600 632 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 104 PID 632 wrote to memory of 2600 632 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 104 PID 632 wrote to memory of 2600 632 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 124⤵
- Program crash
PID:5000
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat""2⤵PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4956 -ip 49561⤵PID:4700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4028 --field-trial-handle=2288,i,11069632825633797559,14829202121434726371,262144 --variations-seed-version /prefetch:81⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD54fc3b31ec84659dbea59fae0190b93a7
SHA156766597937b58fba6dde077f896cbd90359e700
SHA2563c87c98d6a396659ec87dda6b49ca07e57b935cdb1b588db5acf9e24550192fe
SHA51205ad27fa4d71706d75c08fbfd1c64656415d0c92c48ea04512fc0e74d6fc3c03a6271b112dd27959f42369ecebeb68ee849f82a5bf65b3d849e5e14f9b864d34
-
Filesize
294KB
MD5e769fe5993c5e3a28432319d9e28cc45
SHA1e6f2cb7d71596ee39a45cb1c2d2e87220795db2f
SHA256abecee861e0311642dbcd28e48d10ff6673ad999f060db3d50a44f3c2558c730
SHA512e0f7c3d257900d518ece398e6e1577298d15c399e45e3433630853f42bbc86f844869fd6cf59501dca50aff8b5689a797db2d9b9c907418021cf08ae0e98ab9a