Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe
-
Size
619KB
-
MD5
0499f4fb4c2f0288a58d8da7194ee1f2
-
SHA1
a021130a03ab224e048afd58117527393c712af4
-
SHA256
9f82ea1562d67600b8c4dc40bb90221b250c5dbc636574697852e72ba0eb5a0d
-
SHA512
1d1f8bd32db584a0134a667402171ec1c6c93388882c1a2cfa34b6d37c37fc5610efe82e701c6b6fdab84de5a89c9def7c78f85026160ef0b95b2f6046015367
-
SSDEEP
12288:vDoEgXcHpXwLT/2rL/Kn+fa/ysR8HrydpGomF3Z4mxxRDqVTVOC/:vDyXmpA//ALin+fa/ULyiQmXYVTz/
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2444-73-0x0000000000400000-0x0000000000569000-memory.dmp modiloader_stage2 behavioral2/memory/4188-87-0x0000000000400000-0x0000000000569000-memory.dmp modiloader_stage2 behavioral2/memory/4188-90-0x0000000000400000-0x0000000000569000-memory.dmp modiloader_stage2 behavioral2/memory/2444-92-0x0000000000400000-0x0000000000569000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
rej.exepid process 4188 rej.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exedescription ioc process File opened (read-only) \??\H: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\Z: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\Q: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\T: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\U: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\K: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\M: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\O: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\P: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\V: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\G: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\N: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\R: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\S: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\J: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\L: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\W: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\X: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\A: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\B: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\E: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\I: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened (read-only) \??\Y: 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exedescription ioc process File created C:\AutoRun.inf 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened for modification C:\AutoRun.inf 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File created F:\AutoRun.inf 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened for modification F:\AutoRun.inf 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
Processes:
0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exerej.exedescription ioc process File created C:\Windows\SysWOW64\rej.exe 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rej.exe 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rej.exe rej.exe File created C:\Windows\SysWOW64\DelSvel.bat 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exedescription pid process target process PID 2444 wrote to memory of 4188 2444 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe rej.exe PID 2444 wrote to memory of 4188 2444 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe rej.exe PID 2444 wrote to memory of 4188 2444 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe rej.exe PID 2444 wrote to memory of 5032 2444 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe cmd.exe PID 2444 wrote to memory of 5032 2444 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe cmd.exe PID 2444 wrote to memory of 5032 2444 0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0499f4fb4c2f0288a58d8da7194ee1f2_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\rej.exeC:\Windows\system32\rej.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\DelSvel.bat2⤵PID:5032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5a01c2cfa989c25f59675cd56d9f893b1
SHA1346863681f448fe40c3a4890dd64069acbde1e14
SHA2567a6c7511e86f3fed40a5a979ed19c929cae49123386a8160ead1c221330092f4
SHA512a2c763db9d3478033af9d823cded89ead6b75142e330840fc99aa01bf6ae2fe9f7c43aa54f0ac55038f581f840330de8bc570e3bab3f98386b18166abd0d6af2
-
Filesize
619KB
MD50499f4fb4c2f0288a58d8da7194ee1f2
SHA1a021130a03ab224e048afd58117527393c712af4
SHA2569f82ea1562d67600b8c4dc40bb90221b250c5dbc636574697852e72ba0eb5a0d
SHA5121d1f8bd32db584a0134a667402171ec1c6c93388882c1a2cfa34b6d37c37fc5610efe82e701c6b6fdab84de5a89c9def7c78f85026160ef0b95b2f6046015367