Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe
-
Size
602KB
-
MD5
09a503f7b57e4914b42d3e93c7f2dcc4
-
SHA1
297bd886a5bf37912c9a76813ca5ad0ba9087ee0
-
SHA256
4585a83befe0a27607fc8a05c7776bdf165a9e60b8b15b7fe2fee74fa4353fb2
-
SHA512
7750fc23f9403d9a3dd535b746e63435ca39d73e75954c7863ead62b5c2b81d074057e42128dfab1e7dccfacd4633c647aa8da140dbc4a453857b18331f34d18
-
SSDEEP
12288:8sqDzFVVUI5Vry9dKvd2CD6itXRSDoctkHCURjJ51Vxd4F+UAEiV:8sq13/adKd3lsocOlVtKMzV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4796-26-0x0000000000400000-0x000000000050B000-memory.dmp modiloader_stage2 behavioral2/memory/5040-29-0x0000000000400000-0x000000000050B000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
rejoice51.exepid process 5040 rejoice51.exe -
Drops file in System32 directory 2 IoCs
Processes:
rejoice51.exedescription ioc process File created C:\Windows\SysWOW64\_rejoice51.exe rejoice51.exe File opened for modification C:\Windows\SysWOW64\_rejoice51.exe rejoice51.exe -
Drops file in Program Files directory 3 IoCs
Processes:
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4224 5040 WerFault.exe rejoice51.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exerejoice51.exedescription pid process target process PID 4796 wrote to memory of 5040 4796 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe rejoice51.exe PID 4796 wrote to memory of 5040 4796 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe rejoice51.exe PID 4796 wrote to memory of 5040 4796 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe rejoice51.exe PID 5040 wrote to memory of 2068 5040 rejoice51.exe calc.exe PID 5040 wrote to memory of 2068 5040 rejoice51.exe calc.exe PID 5040 wrote to memory of 2068 5040 rejoice51.exe calc.exe PID 4796 wrote to memory of 3272 4796 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe cmd.exe PID 4796 wrote to memory of 3272 4796 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe cmd.exe PID 4796 wrote to memory of 3272 4796 09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09a503f7b57e4914b42d3e93c7f2dcc4_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice51.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 6923⤵
- Program crash
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵PID:3272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5040 -ip 50401⤵PID:2536
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD59d57fae662a7f18c972ba3039d8f8f34
SHA19a46e3a59264331f869ed5ffba1a88780dedad7c
SHA2566e5a934124fa469c8a61cb6be68486d49a9d3029db006adb5980016a9e3fc5e1
SHA512af2c18eadee6178562b2f6a06630c0710a7c6918ced766c48ee3274a51b1b8454cd8d0961a616154151f388f147b6f72033bccfd57afcf327a0a58de14dd375b
-
Filesize
602KB
MD509a503f7b57e4914b42d3e93c7f2dcc4
SHA1297bd886a5bf37912c9a76813ca5ad0ba9087ee0
SHA2564585a83befe0a27607fc8a05c7776bdf165a9e60b8b15b7fe2fee74fa4353fb2
SHA5127750fc23f9403d9a3dd535b746e63435ca39d73e75954c7863ead62b5c2b81d074057e42128dfab1e7dccfacd4633c647aa8da140dbc4a453857b18331f34d18