Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe
-
Size
684KB
-
MD5
06edf9e5b3d6495566399c3d501ae4cf
-
SHA1
37e65972e8c58278932bad3e682516205aed3bae
-
SHA256
f35a3199b34c54e7c3c6f848b71bf6a35cd6f993a047a338ff07da449c44c34d
-
SHA512
49cee0e1e93ec70de646bb7824370711ab077fbc005dd3cd0c65e24ef357d52af053786e8f2c4a9d945fdf31228d2f0945cd713a9e844409ec1e9b91162b3926
-
SSDEEP
12288:KwcvqRrloU/SpmY8rpDPtxwsKHEWpC+ntF3Z4mxx90MHoTAFb/:yg8mDrprtaACbntQmX9KU
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2744-99-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 behavioral1/memory/2176-102-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2180 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 Windows.exe -
Loads dropped DLL 2 IoCs
pid Process 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_Windows.exe Windows.exe File opened for modification C:\Windows\SysWOW64\_Windows.exe Windows.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 2872 2744 Windows.exe 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windows.exe 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windows.exe 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2744 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 28 PID 2176 wrote to memory of 2744 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 28 PID 2176 wrote to memory of 2744 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 28 PID 2176 wrote to memory of 2744 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 28 PID 2744 wrote to memory of 2872 2744 Windows.exe 29 PID 2744 wrote to memory of 2872 2744 Windows.exe 29 PID 2744 wrote to memory of 2872 2744 Windows.exe 29 PID 2744 wrote to memory of 2872 2744 Windows.exe 29 PID 2744 wrote to memory of 2872 2744 Windows.exe 29 PID 2744 wrote to memory of 2872 2744 Windows.exe 29 PID 2176 wrote to memory of 2180 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2180 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2180 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2180 2176 06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windows.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\Windows.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\06edf9e5b3d6495566399c3d501ae4cf_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2180
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD506edf9e5b3d6495566399c3d501ae4cf
SHA137e65972e8c58278932bad3e682516205aed3bae
SHA256f35a3199b34c54e7c3c6f848b71bf6a35cd6f993a047a338ff07da449c44c34d
SHA51249cee0e1e93ec70de646bb7824370711ab077fbc005dd3cd0c65e24ef357d52af053786e8f2c4a9d945fdf31228d2f0945cd713a9e844409ec1e9b91162b3926