Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe
-
Size
279KB
-
MD5
03a2cf836e01c4bbda317dff5f0bc869
-
SHA1
9f0746dc4f9698b7b5916f4327bfb50e27ef73d8
-
SHA256
ed68d679c7ebc0a1b23b215cda2d370a0da53ca08a8d296ffda986a434ff6596
-
SHA512
aeb876ed448acd8a11d4d5da22fc92c1d755990bac4ac8935bfd52bd431d4c96a94c517c1d74f62be74a429c3eebc52e3d9d922919de66d8c7e1c0566e14c4db
-
SSDEEP
6144:nR0XMxh2JejPu6nDSCejtRbxZaBwoJjkE5Mx7xSw33V0dLOwm:OXMxhMebBDnSxE7jkIImFdm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1960-30-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/1684-31-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 behavioral1/memory/1960-39-0x0000000000400000-0x0000000000554000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2728 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
QQ.exepid process 1684 QQ.exe -
Loads dropped DLL 5 IoCs
Processes:
03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exeWerFault.exepid process 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe 3040 WerFault.exe 3040 WerFault.exe 3040 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exedescription ioc process File opened (read-only) \??\G: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\P: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\S: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\J: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\N: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\Q: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\V: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\W: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\X: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\Y: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\A: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\B: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\E: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\H: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\M: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\T: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\Z: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\I: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\K: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\L: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\O: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\R: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened (read-only) \??\U: 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exedescription ioc process File created C:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened for modification C:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File created F:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened for modification F:\AutoRun.inf 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe -
Drops file in Program Files directory 5 IoCs
Processes:
QQ.exe03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\_QQ.exe QQ.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\_QQ.exe QQ.exe File created C:\Program Files\Delet.bat 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File created C:\Program Files\QQ.exe 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe File opened for modification C:\Program Files\QQ.exe 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3040 1684 WerFault.exe QQ.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exeQQ.exedescription pid process target process PID 1960 wrote to memory of 1684 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe QQ.exe PID 1960 wrote to memory of 1684 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe QQ.exe PID 1960 wrote to memory of 1684 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe QQ.exe PID 1960 wrote to memory of 1684 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe QQ.exe PID 1684 wrote to memory of 3040 1684 QQ.exe WerFault.exe PID 1684 wrote to memory of 3040 1684 QQ.exe WerFault.exe PID 1684 wrote to memory of 3040 1684 QQ.exe WerFault.exe PID 1684 wrote to memory of 3040 1684 QQ.exe WerFault.exe PID 1960 wrote to memory of 2728 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe cmd.exe PID 1960 wrote to memory of 2728 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe cmd.exe PID 1960 wrote to memory of 2728 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe cmd.exe PID 1960 wrote to memory of 2728 1960 03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03a2cf836e01c4bbda317dff5f0bc869_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files\QQ.exe"C:\Program Files\QQ.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Delet.bat""2⤵
- Deletes itself
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD53ddefddb59db6f68c8d4c1f85692098d
SHA183039aebf900ef91a7940615635804f29b5047e5
SHA256c9b71afb94fd5ad66d8217f4b1702cce512539311c819b6fdd1834426f3662ca
SHA5122432d2555549f02c6be07831b790c2818eed387eb1612c6cd7007b8908efd51524ea2b67f8b8c875329f1febdb57554598aedbbd35a933d8a146053f83b66cfc
-
Filesize
279KB
MD503a2cf836e01c4bbda317dff5f0bc869
SHA19f0746dc4f9698b7b5916f4327bfb50e27ef73d8
SHA256ed68d679c7ebc0a1b23b215cda2d370a0da53ca08a8d296ffda986a434ff6596
SHA512aeb876ed448acd8a11d4d5da22fc92c1d755990bac4ac8935bfd52bd431d4c96a94c517c1d74f62be74a429c3eebc52e3d9d922919de66d8c7e1c0566e14c4db