Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe
-
Size
80KB
-
MD5
63395baef991d1aa3dd47c6854421bd5
-
SHA1
e9145a4398587c1cefe0204be495b0fb82815d74
-
SHA256
065fb4d44a2056cc198b2098f94e307c05d78bb88940afaf22108b7a41c194ac
-
SHA512
bc0ac8367bf08aaaea45155fe2c6e9cb927202bbb3d63e1e0c467e2e05bee16bf49659ba44e9b355ba85e0768ff019c2b9cb3b6732a0ec4fa15c669cb6ea1a4e
-
SSDEEP
1536:5wRwO4AXSz2ALVuJtOUi4SVSnLto+PfiFpgmMXQs5vCxDEG5inouy8J:SRw1BKTxi4K+PyC5CxwoutJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral1/memory/2352-12-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-15-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-16-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-17-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-18-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-19-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-20-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-21-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-22-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-23-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-24-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-25-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-26-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-27-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-28-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2320-29-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2320 msmgrs.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 msmgrs.exe -
Loads dropped DLL 2 IoCs
pid Process 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\setup\msmgrs.exe 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wins\setup\msmgrs.exe 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe 2320 msmgrs.exe 2320 msmgrs.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2320 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2320 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2320 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe 31 PID 2352 wrote to memory of 2320 2352 63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe 31 PID 2320 wrote to memory of 2244 2320 msmgrs.exe 32 PID 2320 wrote to memory of 2244 2320 msmgrs.exe 32 PID 2320 wrote to memory of 2244 2320 msmgrs.exe 32 PID 2320 wrote to memory of 2244 2320 msmgrs.exe 32 PID 2320 wrote to memory of 2216 2320 msmgrs.exe 33 PID 2320 wrote to memory of 2216 2320 msmgrs.exe 33 PID 2320 wrote to memory of 2216 2320 msmgrs.exe 33 PID 2320 wrote to memory of 2216 2320 msmgrs.exe 33 PID 2216 wrote to memory of 2436 2216 cmd.exe 36 PID 2216 wrote to memory of 2436 2216 cmd.exe 36 PID 2216 wrote to memory of 2436 2216 cmd.exe 36 PID 2216 wrote to memory of 2436 2216 cmd.exe 36 PID 2216 wrote to memory of 2436 2216 cmd.exe 36 PID 2216 wrote to memory of 2436 2216 cmd.exe 36 PID 2216 wrote to memory of 2436 2216 cmd.exe 36 PID 2244 wrote to memory of 2224 2244 cmd.exe 37 PID 2244 wrote to memory of 2224 2244 cmd.exe 37 PID 2244 wrote to memory of 2224 2244 cmd.exe 37 PID 2244 wrote to memory of 2224 2244 cmd.exe 37 PID 2244 wrote to memory of 2224 2244 cmd.exe 37 PID 2244 wrote to memory of 2224 2244 cmd.exe 37 PID 2244 wrote to memory of 2224 2244 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63395baef991d1aa3dd47c6854421bd5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\wins\setup\msmgrs.exe"C:\Windows\system32\wins\setup\msmgrs.exe"2⤵
- Deletes itself
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEditControl.dll3⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEditControl.dll4⤵PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/tebedit.ocx3⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/tebedit.ocx4⤵PID:2436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD563395baef991d1aa3dd47c6854421bd5
SHA1e9145a4398587c1cefe0204be495b0fb82815d74
SHA256065fb4d44a2056cc198b2098f94e307c05d78bb88940afaf22108b7a41c194ac
SHA512bc0ac8367bf08aaaea45155fe2c6e9cb927202bbb3d63e1e0c467e2e05bee16bf49659ba44e9b355ba85e0768ff019c2b9cb3b6732a0ec4fa15c669cb6ea1a4e