Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 06:56
Static task
static1
Behavioral task
behavioral1
Sample
27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe
-
Size
689KB
-
MD5
27a333e9aeb8c68751461090d080791d
-
SHA1
f27c77ae544f03f83fc0d09b18cc42e852dc061b
-
SHA256
e0f44f5eb70f44bf48197b0729458de958d0ee9f7f6cc3ecc9fa460354fdda82
-
SHA512
6f0451a23682e4da8565bc93c74fabab92d87f63c200eed79b0d827be280f796237855e76a781de0345330ee9873dbc5af9fe65187faacf70f481057108c2caf
-
SSDEEP
12288:/upxBi7xX74QXxtYunc6VnCGOjtk4nEs+uFMEeoX0wK+kt1T2MYb:/qxBqxX74QBtYnCROjtkqEs+bWLfb
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3956-47-0x0000000000400000-0x0000000000512000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3956 444.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 444.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2028 3956 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3956 3660 27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe 83 PID 3660 wrote to memory of 3956 3660 27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe 83 PID 3660 wrote to memory of 3956 3660 27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe 83 PID 3956 wrote to memory of 1112 3956 444.exe 85 PID 3956 wrote to memory of 1112 3956 444.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27a333e9aeb8c68751461090d080791d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\444.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\444.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:1112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3956 -s 7603⤵
- Program crash
PID:2028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3956 -ip 39561⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
637KB
MD52c566c8913785c69a72f233a9cac074e
SHA1b6e1c47d8911282be7ade6d6738a30e99ab229eb
SHA25699795e2f8ab62e2769a31986ef6e258813872c48af72837b519db33dc6cf5411
SHA5128e007fa141ceb545ebdbae4185af73c6535aabb2c84f5baf61f0f11a50fc0412e9f66ba6f80de02fa7fab9a6f3e7edcfdda725500aa4a67d7abc78a8639d0b40