Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe
-
Size
423KB
-
MD5
7373e5bee975e11d9de1d68010180910
-
SHA1
b401076f3c4591764d20584756beb501dd00169e
-
SHA256
363f981c55c921629a9b6153f40c5d24a44c3b0c0b1a555c2f10a6559837fe51
-
SHA512
7e1bf3d550fb4dfd302b6588196727bbf6da2181879968df99d2ae3432e8e9aac30afaa69c14881bed7d20eba97bd6dc493e3ade60dd505618827064a29e6efe
-
SSDEEP
12288:ZViWiEV9Ywg1cSm4S0WCN393AlR9u6l7i57:Z5iEV9FS9S0rR0R9u6E
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/2244-6-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 behavioral1/memory/2244-7-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 behavioral1/memory/2244-4-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 behavioral1/memory/2244-8-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 behavioral1/memory/2244-10-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 behavioral1/memory/2244-25-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 behavioral1/memory/2244-26-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\O: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\S: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\K: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\V: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\H: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\J: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\L: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\M: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\N: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\Q: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\W: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\X: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\A: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\B: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\Y: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\I: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\P: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\R: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\T: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\Z: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\E: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened (read-only) \??\G: 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened for modification C:\AutoRun.inf 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File created F:\AutoRun.inf 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened for modification F:\AutoRun.inf 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_360tray.exe 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\_360tray.exe 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1560 set thread context of 2244 1560 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 30 PID 2244 set thread context of 2684 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 39 PID 2244 set thread context of 664 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 44 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\360tray.exe 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\360tray.exe 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2244 1560 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2244 1560 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2244 1560 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2244 1560 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2244 1560 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 30 PID 1560 wrote to memory of 2244 1560 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 30 PID 2244 wrote to memory of 380 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 33 PID 2244 wrote to memory of 380 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 33 PID 2244 wrote to memory of 380 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 33 PID 2244 wrote to memory of 380 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 33 PID 2244 wrote to memory of 380 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 33 PID 2244 wrote to memory of 380 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 33 PID 2244 wrote to memory of 2636 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 34 PID 2244 wrote to memory of 2636 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 34 PID 2244 wrote to memory of 2636 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 34 PID 2244 wrote to memory of 2636 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 34 PID 2244 wrote to memory of 2636 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 34 PID 2244 wrote to memory of 2636 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 34 PID 2244 wrote to memory of 2060 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 35 PID 2244 wrote to memory of 2060 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 35 PID 2244 wrote to memory of 2060 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 35 PID 2244 wrote to memory of 2060 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 35 PID 2244 wrote to memory of 2060 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 35 PID 2244 wrote to memory of 2060 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 35 PID 2244 wrote to memory of 2880 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 36 PID 2244 wrote to memory of 2880 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 36 PID 2244 wrote to memory of 2880 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 36 PID 2244 wrote to memory of 2880 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 36 PID 2244 wrote to memory of 2880 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 36 PID 2244 wrote to memory of 2880 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 36 PID 2244 wrote to memory of 2764 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 37 PID 2244 wrote to memory of 2764 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 37 PID 2244 wrote to memory of 2764 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 37 PID 2244 wrote to memory of 2764 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 37 PID 2244 wrote to memory of 2764 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 37 PID 2244 wrote to memory of 2764 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 37 PID 2244 wrote to memory of 756 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 38 PID 2244 wrote to memory of 756 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 38 PID 2244 wrote to memory of 756 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 38 PID 2244 wrote to memory of 756 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 38 PID 2244 wrote to memory of 756 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 38 PID 2244 wrote to memory of 756 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 38 PID 2244 wrote to memory of 2684 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 39 PID 2244 wrote to memory of 2684 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 39 PID 2244 wrote to memory of 2684 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 39 PID 2244 wrote to memory of 2684 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 39 PID 2244 wrote to memory of 2684 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 39 PID 2244 wrote to memory of 2684 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 39 PID 2244 wrote to memory of 1720 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 40 PID 2244 wrote to memory of 1720 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 40 PID 2244 wrote to memory of 1720 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 40 PID 2244 wrote to memory of 1720 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 40 PID 2244 wrote to memory of 1720 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 40 PID 2244 wrote to memory of 1720 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 40 PID 2244 wrote to memory of 992 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 41 PID 2244 wrote to memory of 992 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 41 PID 2244 wrote to memory of 992 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 41 PID 2244 wrote to memory of 992 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 41 PID 2244 wrote to memory of 992 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 41 PID 2244 wrote to memory of 992 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 41 PID 2244 wrote to memory of 1220 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 42 PID 2244 wrote to memory of 1220 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 42 PID 2244 wrote to memory of 1220 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 42 PID 2244 wrote to memory of 1220 2244 7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\7373e5bee975e11d9de1d68010180910_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7373e5bee975e11d9de1d68010180910_JaffaCakes118.exe2⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:380
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2636
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2060
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2880
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2764
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:756
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2684
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1720
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:992
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1220
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:664
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2192
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2524
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD57373e5bee975e11d9de1d68010180910
SHA1b401076f3c4591764d20584756beb501dd00169e
SHA256363f981c55c921629a9b6153f40c5d24a44c3b0c0b1a555c2f10a6559837fe51
SHA5127e1bf3d550fb4dfd302b6588196727bbf6da2181879968df99d2ae3432e8e9aac30afaa69c14881bed7d20eba97bd6dc493e3ade60dd505618827064a29e6efe