Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe
-
Size
685KB
-
MD5
ab449e0f2008268b5a257f7dcc0de5b5
-
SHA1
61bf0d93e111de28d414aba0f4a0f85288bf5aae
-
SHA256
948ec20749e2012a94115708d63b9f8d4050c0d283844c89c978bcf27d8732fb
-
SHA512
795a1bffb6b838aa625d2da9b73921a5ce7bbc314c95b45c23e2b20479b466912149287f1932a0e75bdd0d524503b2f9dd79776365ebe0518abe1cd622dd1fea
-
SSDEEP
12288:MizJbniWlbbkgKZek+fZ0gj+Lk3gtF3Z4mxxLQHgac9R70:M8JbDbkgKI6gaLk3gtQmXL+gP9q
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/1700-54-0x0000000000400000-0x000000000056E000-memory.dmp modiloader_stage2 behavioral1/memory/2308-78-0x0000000000400000-0x000000000056E000-memory.dmp modiloader_stage2 behavioral1/memory/1700-89-0x0000000000400000-0x000000000056E000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 900 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 windosmisdt.exe -
Loads dropped DLL 5 IoCs
pid Process 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_windosmisdt.exe windosmisdt.exe File opened for modification C:\Windows\SysWOW64\_windosmisdt.exe windosmisdt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 2880 2308 windosmisdt.exe 32 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\windosmisdt.exe ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\windosmisdt.exe ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2772 2308 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windosmisdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2308 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 31 PID 1700 wrote to memory of 2308 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 31 PID 1700 wrote to memory of 2308 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 31 PID 1700 wrote to memory of 2308 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2880 2308 windosmisdt.exe 32 PID 2308 wrote to memory of 2880 2308 windosmisdt.exe 32 PID 2308 wrote to memory of 2880 2308 windosmisdt.exe 32 PID 2308 wrote to memory of 2880 2308 windosmisdt.exe 32 PID 2308 wrote to memory of 2880 2308 windosmisdt.exe 32 PID 2308 wrote to memory of 2880 2308 windosmisdt.exe 32 PID 2308 wrote to memory of 2772 2308 windosmisdt.exe 33 PID 2308 wrote to memory of 2772 2308 windosmisdt.exe 33 PID 2308 wrote to memory of 2772 2308 windosmisdt.exe 33 PID 2308 wrote to memory of 2772 2308 windosmisdt.exe 33 PID 1700 wrote to memory of 900 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 34 PID 1700 wrote to memory of 900 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 34 PID 1700 wrote to memory of 900 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 34 PID 1700 wrote to memory of 900 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 34 PID 1700 wrote to memory of 900 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 34 PID 1700 wrote to memory of 900 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 34 PID 1700 wrote to memory of 900 1700 ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab449e0f2008268b5a257f7dcc0de5b5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\windosmisdt.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\windosmisdt.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2308 -s 2923⤵
- Loads dropped DLL
- Program crash
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD536810c877e8933216d539ee966d1e860
SHA1546ae1e0ed1e37bba405e009ddfbd76be2d9b88e
SHA256e3ee528e94192775fada49992ab87a0d38999ceec03044cae20800e485cf19ba
SHA5129c93702b8d6ca73db386f2dc70177ba5d7060cf162d8faa291402e4241463a39b8a3661d79efb13d5f784003cbafe1189bf71286f17deb9da7ae32841cdfe180
-
Filesize
685KB
MD5ab449e0f2008268b5a257f7dcc0de5b5
SHA161bf0d93e111de28d414aba0f4a0f85288bf5aae
SHA256948ec20749e2012a94115708d63b9f8d4050c0d283844c89c978bcf27d8732fb
SHA512795a1bffb6b838aa625d2da9b73921a5ce7bbc314c95b45c23e2b20479b466912149287f1932a0e75bdd0d524503b2f9dd79776365ebe0518abe1cd622dd1fea