Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
02690209598094f7456576472f275353_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
02690209598094f7456576472f275353_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
02690209598094f7456576472f275353_JaffaCakes118.exe
-
Size
714KB
-
MD5
02690209598094f7456576472f275353
-
SHA1
25b6e41dd50b092db750ed0367aecbf3572e7dd8
-
SHA256
285583228a9e072db82596fa638112f176bd8e18431d89dbe7ce71fac7327eea
-
SHA512
3877968ae4510b540f22796510c932e2cb027b77d44802023ca00c8f29c0577caafd39fba652abf33be132a2eb8293f236258ebdd89bb22d2229d87a7e7be405
-
SSDEEP
12288:Q1GzKgUNf3b+DZXgQ1ItATME9zzJXeJ6cjy0CTFq54gxePdfD1piOe6XOWjlZkI:MgGyXb1DzzJQeiaVfr8WjlmI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2068-23-0x0000000000400000-0x00000000004BA200-memory.dmp modiloader_stage2 behavioral1/memory/1936-37-0x0000000000400000-0x00000000004BA200-memory.dmp modiloader_stage2 behavioral1/memory/2068-38-0x0000000000400000-0x00000000004BA200-memory.dmp modiloader_stage2 behavioral1/memory/1936-49-0x0000000000400000-0x00000000004BA200-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2464 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
Windovs.exepid process 2068 Windovs.exe -
Loads dropped DLL 5 IoCs
Processes:
02690209598094f7456576472f275353_JaffaCakes118.exeWerFault.exepid process 1936 02690209598094f7456576472f275353_JaffaCakes118.exe 1936 02690209598094f7456576472f275353_JaffaCakes118.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
02690209598094f7456576472f275353_JaffaCakes118.exedescription ioc process File opened (read-only) \??\G: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\K: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\L: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\O: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\Q: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\Y: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\A: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\M: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\N: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\R: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\U: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\I: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\P: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\S: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\T: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\V: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\W: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\X: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\J: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\E: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\H: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\Z: 02690209598094f7456576472f275353_JaffaCakes118.exe File opened (read-only) \??\B: 02690209598094f7456576472f275353_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
02690209598094f7456576472f275353_JaffaCakes118.exedescription ioc process File created C:\AutoRun.inf 02690209598094f7456576472f275353_JaffaCakes118.exe File opened for modification C:\AutoRun.inf 02690209598094f7456576472f275353_JaffaCakes118.exe File created F:\AutoRun.inf 02690209598094f7456576472f275353_JaffaCakes118.exe File opened for modification F:\AutoRun.inf 02690209598094f7456576472f275353_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
Processes:
Windovs.exedescription ioc process File created C:\Windows\SysWOW64\_Windovs.exe Windovs.exe File opened for modification C:\Windows\SysWOW64\_Windovs.exe Windovs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Windovs.exedescription pid process target process PID 2068 set thread context of 3024 2068 Windovs.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
02690209598094f7456576472f275353_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windovs.exe 02690209598094f7456576472f275353_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windovs.exe 02690209598094f7456576472f275353_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat 02690209598094f7456576472f275353_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2608 2068 WerFault.exe Windovs.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
02690209598094f7456576472f275353_JaffaCakes118.exeWindovs.exedescription pid process target process PID 1936 wrote to memory of 2068 1936 02690209598094f7456576472f275353_JaffaCakes118.exe Windovs.exe PID 1936 wrote to memory of 2068 1936 02690209598094f7456576472f275353_JaffaCakes118.exe Windovs.exe PID 1936 wrote to memory of 2068 1936 02690209598094f7456576472f275353_JaffaCakes118.exe Windovs.exe PID 1936 wrote to memory of 2068 1936 02690209598094f7456576472f275353_JaffaCakes118.exe Windovs.exe PID 2068 wrote to memory of 3024 2068 Windovs.exe calc.exe PID 2068 wrote to memory of 3024 2068 Windovs.exe calc.exe PID 2068 wrote to memory of 3024 2068 Windovs.exe calc.exe PID 2068 wrote to memory of 3024 2068 Windovs.exe calc.exe PID 2068 wrote to memory of 3024 2068 Windovs.exe calc.exe PID 2068 wrote to memory of 3024 2068 Windovs.exe calc.exe PID 2068 wrote to memory of 2608 2068 Windovs.exe WerFault.exe PID 2068 wrote to memory of 2608 2068 Windovs.exe WerFault.exe PID 2068 wrote to memory of 2608 2068 Windovs.exe WerFault.exe PID 2068 wrote to memory of 2608 2068 Windovs.exe WerFault.exe PID 1936 wrote to memory of 2464 1936 02690209598094f7456576472f275353_JaffaCakes118.exe cmd.exe PID 1936 wrote to memory of 2464 1936 02690209598094f7456576472f275353_JaffaCakes118.exe cmd.exe PID 1936 wrote to memory of 2464 1936 02690209598094f7456576472f275353_JaffaCakes118.exe cmd.exe PID 1936 wrote to memory of 2464 1936 02690209598094f7456576472f275353_JaffaCakes118.exe cmd.exe PID 1936 wrote to memory of 2464 1936 02690209598094f7456576472f275353_JaffaCakes118.exe cmd.exe PID 1936 wrote to memory of 2464 1936 02690209598094f7456576472f275353_JaffaCakes118.exe cmd.exe PID 1936 wrote to memory of 2464 1936 02690209598094f7456576472f275353_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02690209598094f7456576472f275353_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02690209598094f7456576472f275353_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windovs.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windovs.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD529e27cf2a153083f1f229e481aef8185
SHA1651bec91e5e72c4c2001dd694905edd5c19bc76f
SHA2565faa3b4f5a756cad780cec7bf87301a50217d9ee35331bec2258e4ff86e31d9d
SHA512674d00461bb000c92dc08b5223d2a632b7b02ab223b7fdafe0bda2a05541bd31892f9a4e85c358b5bdeefb67230dd49c41929a48d655e423e0e7130bba47e7f5
-
Filesize
714KB
MD502690209598094f7456576472f275353
SHA125b6e41dd50b092db750ed0367aecbf3572e7dd8
SHA256285583228a9e072db82596fa638112f176bd8e18431d89dbe7ce71fac7327eea
SHA5123877968ae4510b540f22796510c932e2cb027b77d44802023ca00c8f29c0577caafd39fba652abf33be132a2eb8293f236258ebdd89bb22d2229d87a7e7be405