Analysis
-
max time kernel
142s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
6345907153d820edf8402066bb70732f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6345907153d820edf8402066bb70732f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6345907153d820edf8402066bb70732f_JaffaCakes118.exe
-
Size
674KB
-
MD5
6345907153d820edf8402066bb70732f
-
SHA1
12bfb249f916095a68f621afeff496fb930858c0
-
SHA256
da74061519b19b1653023bec28d65a2153ce7236b8539f417e5831a9a5a908e4
-
SHA512
cf7080e11fb6723f8f162d343d2c26a32e501f55eb1c5c1122d301197d44fe642adb0678807d4f2dffb528eb7b2cd6df431b96443769eb1dee7849e0d630d982
-
SSDEEP
12288:8bm1kmrrI8BMuVZFcghkgHmjRzYEJ3jTfneN8MBuuvNtTird:8bvKI8yuvXuYujLnYBRHTEd
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2904-29-0x0000000000400000-0x00000000004BA000-memory.dmp modiloader_stage2 behavioral1/files/0x0004000000017801-24.dat modiloader_stage2 behavioral1/memory/2432-42-0x0000000000400000-0x0000000000510000-memory.dmp modiloader_stage2 behavioral1/memory/2904-46-0x0000000000400000-0x00000000004BA000-memory.dmp modiloader_stage2 -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x001d000000018f3e-32.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2904 RunMgr.EXE -
Loads dropped DLL 4 IoCs
pid Process 2904 RunMgr.EXE 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 2852 WerFault.exe 2836 WerFault.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6345907153d820edf8402066bb70732f_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\FieleWay.txt RunMgr.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\RunMgr.EXE 6345907153d820edf8402066bb70732f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2836 2904 WerFault.exe 30 2852 2432 WerFault.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2904 RunMgr.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2904 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 30 PID 2432 wrote to memory of 2904 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 30 PID 2432 wrote to memory of 2904 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 30 PID 2432 wrote to memory of 2904 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 30 PID 2432 wrote to memory of 2796 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2796 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2796 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2796 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2928 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 33 PID 2432 wrote to memory of 2928 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 33 PID 2432 wrote to memory of 2928 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 33 PID 2432 wrote to memory of 2928 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 33 PID 2904 wrote to memory of 2836 2904 RunMgr.EXE 34 PID 2904 wrote to memory of 2836 2904 RunMgr.EXE 34 PID 2904 wrote to memory of 2836 2904 RunMgr.EXE 34 PID 2904 wrote to memory of 2836 2904 RunMgr.EXE 34 PID 2432 wrote to memory of 2852 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 36 PID 2432 wrote to memory of 2852 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 36 PID 2432 wrote to memory of 2852 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 36 PID 2432 wrote to memory of 2852 2432 6345907153d820edf8402066bb70732f_JaffaCakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6345907153d820edf8402066bb70732f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6345907153d820edf8402066bb70732f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\RunMgr.EXE"C:\Windows\RunMgr.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del %SystemRoot%\Debug.exe2⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\634590~1.EXE > nul2⤵PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 3602⤵
- Loads dropped DLL
- Program crash
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
888KB
MD5897506398278b204b065dc442fcb5bf0
SHA1db3e03cbaa938ac810b0201e3b29da20be86ee5f
SHA256c61c7e0e33ffa0784398acd2813cf09ab328d21d3fdb34ba3efa60a679738296
SHA512d32e2a91ab8954d58153fbe7538c92e5b145624097a12a4f8898ffafa36df2bfa6fcc4b8060881460c17978a511c58c8cb077d89ab1e346984c0f233e814a81e
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183