Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe
-
Size
602KB
-
MD5
09a503f7b57e4914b42d3e93c7f2dcc4
-
SHA1
297bd886a5bf37912c9a76813ca5ad0ba9087ee0
-
SHA256
4585a83befe0a27607fc8a05c7776bdf165a9e60b8b15b7fe2fee74fa4353fb2
-
SHA512
7750fc23f9403d9a3dd535b746e63435ca39d73e75954c7863ead62b5c2b81d074057e42128dfab1e7dccfacd4633c647aa8da140dbc4a453857b18331f34d18
-
SSDEEP
12288:8sqDzFVVUI5Vry9dKvd2CD6itXRSDoctkHCURjJ51Vxd4F+UAEiV:8sq13/adKd3lsocOlVtKMzV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1412-58-0x0000000000400000-0x000000000050B000-memory.dmp modiloader_stage2 behavioral1/memory/2788-59-0x0000000000400000-0x000000000050B000-memory.dmp modiloader_stage2 behavioral1/memory/1412-64-0x0000000000400000-0x000000000050B000-memory.dmp modiloader_stage2 behavioral1/memory/1412-74-0x0000000000400000-0x000000000050B000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3012 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
rejoice51.exepid process 2788 rejoice51.exe -
Loads dropped DLL 5 IoCs
Processes:
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exeWerFault.exepid process 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe -
Drops file in System32 directory 2 IoCs
Processes:
rejoice51.exedescription ioc process File created C:\Windows\SysWOW64\_rejoice51.exe rejoice51.exe File opened for modification C:\Windows\SysWOW64\_rejoice51.exe rejoice51.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rejoice51.exedescription pid process target process PID 2788 set thread context of 2072 2788 rejoice51.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2784 2788 WerFault.exe rejoice51.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exerejoice51.exedescription pid process target process PID 1412 wrote to memory of 2788 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe rejoice51.exe PID 1412 wrote to memory of 2788 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe rejoice51.exe PID 1412 wrote to memory of 2788 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe rejoice51.exe PID 1412 wrote to memory of 2788 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe rejoice51.exe PID 2788 wrote to memory of 2072 2788 rejoice51.exe calc.exe PID 2788 wrote to memory of 2072 2788 rejoice51.exe calc.exe PID 2788 wrote to memory of 2072 2788 rejoice51.exe calc.exe PID 2788 wrote to memory of 2072 2788 rejoice51.exe calc.exe PID 2788 wrote to memory of 2072 2788 rejoice51.exe calc.exe PID 2788 wrote to memory of 2072 2788 rejoice51.exe calc.exe PID 2788 wrote to memory of 2784 2788 rejoice51.exe WerFault.exe PID 2788 wrote to memory of 2784 2788 rejoice51.exe WerFault.exe PID 2788 wrote to memory of 2784 2788 rejoice51.exe WerFault.exe PID 2788 wrote to memory of 2784 2788 rejoice51.exe WerFault.exe PID 1412 wrote to memory of 3012 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe cmd.exe PID 1412 wrote to memory of 3012 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe cmd.exe PID 1412 wrote to memory of 3012 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe cmd.exe PID 1412 wrote to memory of 3012 1412 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵
- Deletes itself
PID:3012
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD59d57fae662a7f18c972ba3039d8f8f34
SHA19a46e3a59264331f869ed5ffba1a88780dedad7c
SHA2566e5a934124fa469c8a61cb6be68486d49a9d3029db006adb5980016a9e3fc5e1
SHA512af2c18eadee6178562b2f6a06630c0710a7c6918ced766c48ee3274a51b1b8454cd8d0961a616154151f388f147b6f72033bccfd57afcf327a0a58de14dd375b
-
Filesize
602KB
MD509a503f7b57e4914b42d3e93c7f2dcc4
SHA1297bd886a5bf37912c9a76813ca5ad0ba9087ee0
SHA2564585a83befe0a27607fc8a05c7776bdf165a9e60b8b15b7fe2fee74fa4353fb2
SHA5127750fc23f9403d9a3dd535b746e63435ca39d73e75954c7863ead62b5c2b81d074057e42128dfab1e7dccfacd4633c647aa8da140dbc4a453857b18331f34d18