Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
4bc235907001035d93c6685114479eec_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4bc235907001035d93c6685114479eec_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bc235907001035d93c6685114479eec_JaffaCakes118.exe
-
Size
218KB
-
MD5
4bc235907001035d93c6685114479eec
-
SHA1
8175d4f6857c3ded7a995c5e01749df52924d24c
-
SHA256
fb1bb45f23d277839bfd05457d9bad751c4f51cc95bec754d3d93ed7832facc3
-
SHA512
8916d0de889e2a895f2951d694e0bc8f4d539b346a9fe92abe6b5a5e1e434a1e8258417c186c667646570e2ddf4dab1da739dfa1377ac1a100b54a89f7ab81ca
-
SSDEEP
6144:r+q/S6JXmJbRPGC8+IA8qoD39QoH2IYrDt/Q:HFG45+IA1MWo4t/Q
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral1/memory/2244-2-0x0000000013140000-0x0000000013207000-memory.dmp modiloader_stage2 behavioral1/files/0x0009000000016de9-7.dat modiloader_stage2 behavioral1/memory/2820-9-0x0000000000360000-0x00000000003DC000-memory.dmp modiloader_stage2 behavioral1/memory/2244-10-0x0000000013140000-0x0000000013207000-memory.dmp modiloader_stage2 behavioral1/memory/2820-11-0x0000000000360000-0x00000000003DC000-memory.dmp modiloader_stage2 behavioral1/memory/2820-12-0x0000000000360000-0x00000000003DC000-memory.dmp modiloader_stage2 -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netns\Parameters\ServiceDll = "C:\\Windows\\System32\\sysns.dll" 4bc235907001035d93c6685114479eec_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2820 svchost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\netservice.exe 4bc235907001035d93c6685114479eec_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysns.dll 4bc235907001035d93c6685114479eec_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysns.dll 4bc235907001035d93c6685114479eec_JaffaCakes118.exe File created C:\Windows\SysWOW64\netservice.exe 4bc235907001035d93c6685114479eec_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeBackupPrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe Token: SeRestorePrivilege 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2744 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe 31 PID 2244 wrote to memory of 2744 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe 31 PID 2244 wrote to memory of 2744 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe 31 PID 2244 wrote to memory of 2744 2244 4bc235907001035d93c6685114479eec_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bc235907001035d93c6685114479eec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bc235907001035d93c6685114479eec_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\4bc235907001035d93c6685114479eec_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2744
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k network1⤵
- Loads dropped DLL
PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD5813a5af74a429a664eaa2623eaa3b390
SHA171db501ac359ac462e3af5419b888dc43b58a9f9
SHA25651b0294a20a1e958bab85e607e5500bb4bea26fe4f41846851befc4d54f3e93f
SHA51266a547b4db3a6c270fa3adb4b0f089544ebcd93ad56e10822d959e9a7630b1c573ed040185b401195a6e6da9349f7bf390768bb0b132bc3f4c52f76a7899a259