Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe
-
Size
581KB
-
MD5
02f2fb981df03a14510e5c320752248d
-
SHA1
1a62b7edd945483cf4cd434c073ab0e1d58ef564
-
SHA256
21be6f449fdbf66a9f69faeb5f74f19a0d8290067a5449299e4d5eec43e4bcfe
-
SHA512
b624cc51289194e64cc7cff5125efb4cb8f8cfcce257c86b9caf059c672fddb358ae77ba5ef73cdf155d2636729dcc53755492cbc399e12761a4375c62bc1b62
-
SSDEEP
12288:MudEJ0qv/aVIZerIa3F3Z4mxxooEtlK+kt9T2MTL:MQEb5qQmXhGG
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1732-111-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/2820-112-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/1732-132-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 688 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
17mf8.cn.exepid process 2820 17mf8.cn.exe -
Loads dropped DLL 5 IoCs
Processes:
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exeWerFault.exepid process 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe 2424 WerFault.exe 2424 WerFault.exe 2424 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exedescription ioc process File opened (read-only) \??\Q: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\A: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\N: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\P: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\T: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\U: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\E: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\I: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\K: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\R: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\S: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\W: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\X: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\B: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\H: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\L: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\O: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\V: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\Y: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\Z: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\G: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\J: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened (read-only) \??\M: 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exedescription ioc process File opened for modification F:\AutoRun.inf 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File created C:\AutoRun.inf 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened for modification C:\AutoRun.inf 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File created F:\AutoRun.inf 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
Processes:
17mf8.cn.exedescription ioc process File created C:\Windows\SysWOW64\_17mf8.cn.exe 17mf8.cn.exe File opened for modification C:\Windows\SysWOW64\_17mf8.cn.exe 17mf8.cn.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
17mf8.cn.exedescription pid process target process PID 2820 set thread context of 1252 2820 17mf8.cn.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\17mf8.cn.exe 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\17mf8.cn.exe 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2424 2820 WerFault.exe 17mf8.cn.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe17mf8.cn.exedescription pid process target process PID 1732 wrote to memory of 2820 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe 17mf8.cn.exe PID 1732 wrote to memory of 2820 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe 17mf8.cn.exe PID 1732 wrote to memory of 2820 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe 17mf8.cn.exe PID 1732 wrote to memory of 2820 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe 17mf8.cn.exe PID 2820 wrote to memory of 1252 2820 17mf8.cn.exe calc.exe PID 2820 wrote to memory of 1252 2820 17mf8.cn.exe calc.exe PID 2820 wrote to memory of 1252 2820 17mf8.cn.exe calc.exe PID 2820 wrote to memory of 1252 2820 17mf8.cn.exe calc.exe PID 2820 wrote to memory of 1252 2820 17mf8.cn.exe calc.exe PID 2820 wrote to memory of 1252 2820 17mf8.cn.exe calc.exe PID 2820 wrote to memory of 2424 2820 17mf8.cn.exe WerFault.exe PID 2820 wrote to memory of 2424 2820 17mf8.cn.exe WerFault.exe PID 2820 wrote to memory of 2424 2820 17mf8.cn.exe WerFault.exe PID 2820 wrote to memory of 2424 2820 17mf8.cn.exe WerFault.exe PID 1732 wrote to memory of 688 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe cmd.exe PID 1732 wrote to memory of 688 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe cmd.exe PID 1732 wrote to memory of 688 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe cmd.exe PID 1732 wrote to memory of 688 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe cmd.exe PID 1732 wrote to memory of 688 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe cmd.exe PID 1732 wrote to memory of 688 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe cmd.exe PID 1732 wrote to memory of 688 1732 02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02f2fb981df03a14510e5c320752248d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\17mf8.cn.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\17mf8.cn.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
PID:688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
581KB
MD502f2fb981df03a14510e5c320752248d
SHA11a62b7edd945483cf4cd434c073ab0e1d58ef564
SHA25621be6f449fdbf66a9f69faeb5f74f19a0d8290067a5449299e4d5eec43e4bcfe
SHA512b624cc51289194e64cc7cff5125efb4cb8f8cfcce257c86b9caf059c672fddb358ae77ba5ef73cdf155d2636729dcc53755492cbc399e12761a4375c62bc1b62
-
Filesize
212B
MD52f142b6a47107d2a85f8985f38ed7348
SHA1a1072abe67d5b58cbfff88d3ceff425da5212699
SHA256dbda6bff5a91b6a467c9ad38bf1ef2b423ee820d9a93228cd84d70e8e251a3ad
SHA51287af0fa279e72f4dc127f798617f0a44576d61608952454e8d9f25565d9b0cbad444b92f380a15a9756ceafda148acb531b3f5a2488dcdcf47ac2239615665d4