Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe
-
Size
685KB
-
MD5
f499dfb009455041674e21bd9e07b191
-
SHA1
832e58060660b484316a2a7872dee156ebc820ab
-
SHA256
e033d009fa9681b8513cf3c0534d8fb9621288050118ca8f11711a288e15719c
-
SHA512
e21290c4a14485ee58be4324c3f86cfbf1940468442016b77a8cab095ed35d00008960d0e53fc5d88c6d1999e1e488a3d0af4536046d20fdf534c746fb95bd11
-
SSDEEP
12288:YasLorqYAsFmRfGXEVKCD3vO/eMFxZwMxRQb6r3F3Z4mxxJ0MHoTAFb03:YasLorlzFmRKopDfO/Dbm63QmXJKL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2532-42-0x0000000000400000-0x0000000000571000-memory.dmp modiloader_stage2 behavioral1/memory/2292-45-0x0000000000400000-0x0000000000571000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2532 nod321.exe -
Loads dropped DLL 2 IoCs
pid Process 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_nod321.exe nod321.exe File opened for modification C:\Windows\SysWOW64\_nod321.exe nod321.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2532 set thread context of 2540 2532 nod321.exe 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\nod321.exe f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\nod321.exe f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2532 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2532 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2532 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 28 PID 2292 wrote to memory of 2532 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 28 PID 2532 wrote to memory of 2540 2532 nod321.exe 29 PID 2532 wrote to memory of 2540 2532 nod321.exe 29 PID 2532 wrote to memory of 2540 2532 nod321.exe 29 PID 2532 wrote to memory of 2540 2532 nod321.exe 29 PID 2532 wrote to memory of 2540 2532 nod321.exe 29 PID 2532 wrote to memory of 2540 2532 nod321.exe 29 PID 2532 wrote to memory of 2708 2532 nod321.exe 30 PID 2532 wrote to memory of 2708 2532 nod321.exe 30 PID 2532 wrote to memory of 2708 2532 nod321.exe 30 PID 2532 wrote to memory of 2708 2532 nod321.exe 30 PID 2292 wrote to memory of 2608 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2608 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2608 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2608 2292 f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\nod321.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\nod321.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2540
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\f499dfb009455041674e21bd9e07b191_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2608
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
685KB
MD5f499dfb009455041674e21bd9e07b191
SHA1832e58060660b484316a2a7872dee156ebc820ab
SHA256e033d009fa9681b8513cf3c0534d8fb9621288050118ca8f11711a288e15719c
SHA512e21290c4a14485ee58be4324c3f86cfbf1940468442016b77a8cab095ed35d00008960d0e53fc5d88c6d1999e1e488a3d0af4536046d20fdf534c746fb95bd11