Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe
-
Size
282KB
-
MD5
024e1128de08ddaf5fe238d19ea95334
-
SHA1
4155f64811263c32acdb51be005e141caf387876
-
SHA256
d8cc51b45c21626b5acc03d816da15fafaaa791e23e23bed2c1e1d34a37494c7
-
SHA512
9d84805090922df041c425a976c2b3fca556c940ded54eef5bd37579a5a204a5edc72d3a1b08292790817931da182ac89ca923a4240984edfbbc089a0f832414
-
SSDEEP
3072:c1WnuDl+tchjRCfgSHSEopXUcl1gBWEFSrMpPCxmQ/Ex5L2Ku1m5e1JWKT4V8Y51:qT1KBnoCq1w0Ipim3M1m5e1UKYA0
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2416-24-0x0000000000400000-0x0000000000505000-memory.dmp modiloader_stage2 behavioral1/memory/2596-25-0x0000000000400000-0x0000000000505000-memory.dmp modiloader_stage2 behavioral1/memory/2416-38-0x0000000000400000-0x0000000000505000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2568 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
rejoice101.exepid process 2596 rejoice101.exe -
Loads dropped DLL 5 IoCs
Processes:
024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exeWerFault.exepid process 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe -
Drops file in System32 directory 2 IoCs
Processes:
rejoice101.exedescription ioc process File created C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe File opened for modification C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rejoice101.exedescription pid process target process PID 2596 set thread context of 2608 2596 rejoice101.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SxDel.bat 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2660 2596 WerFault.exe rejoice101.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exerejoice101.exedescription pid process target process PID 2416 wrote to memory of 2596 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe rejoice101.exe PID 2416 wrote to memory of 2596 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe rejoice101.exe PID 2416 wrote to memory of 2596 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe rejoice101.exe PID 2416 wrote to memory of 2596 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe rejoice101.exe PID 2596 wrote to memory of 2608 2596 rejoice101.exe calc.exe PID 2596 wrote to memory of 2608 2596 rejoice101.exe calc.exe PID 2596 wrote to memory of 2608 2596 rejoice101.exe calc.exe PID 2596 wrote to memory of 2608 2596 rejoice101.exe calc.exe PID 2596 wrote to memory of 2608 2596 rejoice101.exe calc.exe PID 2596 wrote to memory of 2608 2596 rejoice101.exe calc.exe PID 2596 wrote to memory of 2660 2596 rejoice101.exe WerFault.exe PID 2596 wrote to memory of 2660 2596 rejoice101.exe WerFault.exe PID 2596 wrote to memory of 2660 2596 rejoice101.exe WerFault.exe PID 2596 wrote to memory of 2660 2596 rejoice101.exe WerFault.exe PID 2416 wrote to memory of 2568 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe cmd.exe PID 2416 wrote to memory of 2568 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe cmd.exe PID 2416 wrote to memory of 2568 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe cmd.exe PID 2416 wrote to memory of 2568 2416 024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\024e1128de08ddaf5fe238d19ea95334_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SxDel.bat""2⤵
- Deletes itself
PID:2568
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c14f2598c064ca40aa677fa716e4c07c
SHA15b5711bbe721ca60d6e004b80c2645698bace8d5
SHA256470f72ea15131621fe66c032e353516eb934f6c551d6e99968f36c30bff36f6f
SHA512f780b1971b08ebf47bec6f4e190246fae725115ce90b8757424e00df6ceb3894c5ecd37ca9c9700df9bc79b4d6014d4602d5907d50a0e4ddc10d85f549cfa989
-
Filesize
282KB
MD5024e1128de08ddaf5fe238d19ea95334
SHA14155f64811263c32acdb51be005e141caf387876
SHA256d8cc51b45c21626b5acc03d816da15fafaaa791e23e23bed2c1e1d34a37494c7
SHA5129d84805090922df041c425a976c2b3fca556c940ded54eef5bd37579a5a204a5edc72d3a1b08292790817931da182ac89ca923a4240984edfbbc089a0f832414