Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe
-
Size
392KB
-
MD5
3b76dce7898efb01104f860ea3c90f06
-
SHA1
cd7de7df42b24d9bd62d1da5fdd3e9bfdd53c256
-
SHA256
fc5535faced4f0165bc911bb15f2ed082afa14f3d3a81c207dc11896971d2719
-
SHA512
fdbc4a0c2de437e7c917d02709af04f8f5162973b9b1264917fc692e4800d7aa9e5c667958f8cf47c66c96193e487f218c1020d79d0775f6b39c151dbf8af242
-
SSDEEP
12288:IhRTDAT2QF3Z4mxxy1P0KXpsj0JlETJWn8:IhS2QQmXHxjaETj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3296-95-0x00000000005C0000-0x00000000005E4000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3296 server.exe -
Loads dropped DLL 2 IoCs
pid Process 3296 server.exe 3296 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll server.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3296 server.exe 3296 server.exe 3296 server.exe 3296 server.exe 3296 server.exe 3296 server.exe 3296 server.exe 3296 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3296 server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3856 wrote to memory of 3296 3856 3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe 83 PID 3856 wrote to memory of 3296 3856 3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe 83 PID 3856 wrote to memory of 3296 3856 3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b76dce7898efb01104f860ea3c90f06_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5594054e159bef7151719ca7f5182961d
SHA1a51ce91e94e3c68de0d4a0ac968d8a0242947d14
SHA25664d8b1ed8a727d9385dd8d982beffcdb4a2cab4cbe29a429c237d25bf1aaa48a
SHA5123de6fd264bd5ba0c7f3179955d422bbb042f028af7bb69e939f4e4cd0a8e322f2e7f858d3a8a6e27fab975aceff0cf6143344b364d663c9135a207b82757952d
-
Filesize
40KB
MD5cf53c4211cadfc6a77daee5f959cba58
SHA1621f543726cd5a246cf0daa0b822ea90ae1a5ca7
SHA256b44965a5fb8d520b84087646f6dbf7671437e07913f2a6c9cdfe8272876c2b5b
SHA512e91438e5275b873bf628a92cf998d159757ffa8e5d9c1075bc1fd9576f5c0088850bf7b2e32df3034411d141b7e000270a3e80e5e2b0175100c625edfec88163