Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 23:08
Behavioral task
behavioral1
Sample
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe
-
Size
739KB
-
MD5
0110f4501ad87e14e01626f24a28358c
-
SHA1
fe170c9aa972201cfac09083998e69de52f2a208
-
SHA256
c904070b30dfb20429637044e4dbfd0d1330094934552847fa79fb16122eda7f
-
SHA512
e29b63c4379217cf40491d194fee85e962a0ab36e9ad604c32a1a05c2fbc41b0ef827dbf5d6a9578836e19ac20ecfc9efff40087db5b4565f2e876bab4739c8f
-
SSDEEP
12288:bPLu4uxlc+OgHdJ4b+Mrc6vu50rtHPGg43r4dm/PKGPwtvRnnTxsMxD:bPi1usJ4CMrnu5Kug4bowGtZnTxskD
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
Processes:
resource yara_rule F:\rejoice101.exe modiloader_stage2 behavioral1/memory/2704-26-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/1840-31-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/3012-32-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral1/memory/1840-43-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2940 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
rejoice101.exepid process 3012 rejoice101.exe -
Loads dropped DLL 5 IoCs
Processes:
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exeWerFault.exepid process 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe 2768 WerFault.exe 2768 WerFault.exe 2768 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exedescription ioc process File opened (read-only) \??\A: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\B: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\L: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\P: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\Y: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\Z: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\E: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\G: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\H: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\J: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\K: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\N: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\X: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\M: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\O: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\Q: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\V: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\I: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\R: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\S: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\T: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\U: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened (read-only) \??\W: 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exedescription ioc process File created C:\AutoRun.inf 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened for modification C:\AutoRun.inf 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File created F:\AutoRun.inf 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened for modification F:\AutoRun.inf 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
Processes:
rejoice101.exedescription ioc process File created C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe File opened for modification C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rejoice101.exedescription pid process target process PID 3012 set thread context of 2704 3012 rejoice101.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\DeletSev.bat 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2768 3012 WerFault.exe rejoice101.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exerejoice101.exedescription pid process target process PID 1840 wrote to memory of 3012 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe rejoice101.exe PID 1840 wrote to memory of 3012 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe rejoice101.exe PID 1840 wrote to memory of 3012 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe rejoice101.exe PID 1840 wrote to memory of 3012 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe rejoice101.exe PID 3012 wrote to memory of 2704 3012 rejoice101.exe calc.exe PID 3012 wrote to memory of 2704 3012 rejoice101.exe calc.exe PID 3012 wrote to memory of 2704 3012 rejoice101.exe calc.exe PID 3012 wrote to memory of 2704 3012 rejoice101.exe calc.exe PID 3012 wrote to memory of 2704 3012 rejoice101.exe calc.exe PID 3012 wrote to memory of 2704 3012 rejoice101.exe calc.exe PID 3012 wrote to memory of 2768 3012 rejoice101.exe WerFault.exe PID 3012 wrote to memory of 2768 3012 rejoice101.exe WerFault.exe PID 3012 wrote to memory of 2768 3012 rejoice101.exe WerFault.exe PID 3012 wrote to memory of 2768 3012 rejoice101.exe WerFault.exe PID 1840 wrote to memory of 2940 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe cmd.exe PID 1840 wrote to memory of 2940 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe cmd.exe PID 1840 wrote to memory of 2940 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe cmd.exe PID 1840 wrote to memory of 2940 1840 0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0110f4501ad87e14e01626f24a28358c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 2803⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DeletSev.bat""2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\DeletSev.batFilesize
212B
MD5d6f59ed1b70d3e10dbd4d65ae19a4fcb
SHA1c3fae3d8d2b122bcb5adb0ae0b9e711283c9870c
SHA256dd65d82e424df12587bfc274eb6863b1510a2b25707f7fd514aad83c6972fb40
SHA51276f978809ae4738b65ed4786b3fa36ae08e6a1e323c5b1718ae9265e652bb24afa26af804cfd9611f4e88340c7fe72abce89a8ad715930532e1fc869a48392f3
-
F:\rejoice101.exeFilesize
739KB
MD50110f4501ad87e14e01626f24a28358c
SHA1fe170c9aa972201cfac09083998e69de52f2a208
SHA256c904070b30dfb20429637044e4dbfd0d1330094934552847fa79fb16122eda7f
SHA512e29b63c4379217cf40491d194fee85e962a0ab36e9ad604c32a1a05c2fbc41b0ef827dbf5d6a9578836e19ac20ecfc9efff40087db5b4565f2e876bab4739c8f
-
memory/1840-0-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/1840-31-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/1840-35-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/1840-43-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2704-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2704-26-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/2704-24-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/3012-21-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/3012-32-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB