Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe
-
Size
667KB
-
MD5
5c6298764ccf6dd9540913c804cea646
-
SHA1
d38205c76faf1432bbe8da38a9e7be66061d7c83
-
SHA256
6e5ceca74ac8fb64c603097c5c21f363a005ad726f0d68619b211d695ef3228f
-
SHA512
dfb70bdb1596bfac4f5691c2ec8bff88a0135fdccb5e55de7d63e51fbf48892e67e5d8f9e7f842a72145d1eae06d7a7f0f25786e59284f772834368afd5ba185
-
SSDEEP
12288:jYCopATH2Bft4VpgqaOb+XHuQw2hv1zq0FJkQhz7XxqF3Z4mxx1zWkDX6z+6tvWF:jJTH2Bft4AVOb+1RRqGhzdqQmXM5z+6+
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2140-21-0x0000000000400000-0x000000000050C200-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2140 3.exe -
Loads dropped DLL 3 IoCs
pid Process 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 2140 3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2140 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2140 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2140 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2140 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2140 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2140 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2140 1720 5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2324 2140 3.exe 31 PID 2140 wrote to memory of 2324 2140 3.exe 31 PID 2140 wrote to memory of 2324 2140 3.exe 31 PID 2140 wrote to memory of 2324 2140 3.exe 31 PID 2140 wrote to memory of 2324 2140 3.exe 31 PID 2140 wrote to memory of 2324 2140 3.exe 31 PID 2140 wrote to memory of 2324 2140 3.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c6298764ccf6dd9540913c804cea646_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD5a66a29208099cff10180cf6e5f377523
SHA193e2729881a82d2dab784b128d519adbd8900c75
SHA25619454d8f2d50d65820a14db9f724640b4fae9bf4cc49f92a45f2c23a77b7c598
SHA512220d827a3f0af52b55a80558038bf5d18fbdced40ecd4735a6184d6613cf403cf1eb9b96c67c3b4d40ab1f4fd1962dad745c7a03ca8f1daaf00eec5c927dddee