Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 20:12
Behavioral task
behavioral1
Sample
b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe
-
Size
102KB
-
MD5
b4de47e58c8312eeaa697d0fb606e085
-
SHA1
50be87a9abd6a23088e560690fb4f6ec97fc7bda
-
SHA256
4cb99d81ccfa83ea7dacbfe068f11b1d01eddad916a5333b50c4d1807b333698
-
SHA512
66ad01cb087dacc6141fa5bc5c99e5e1f1cecdc84cd7928760ccf32369d9ccd08c8092441c7da46aa567934ea34614f1be68eaa1c04d1f7ce457115bf2f68da9
-
SSDEEP
3072:aqSmMAffG3iHA4pI7D6y/AROVM5h0xO/x136:9MA3GyR27WoAr5h0xO7q
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "userinit.exe,C:\\Windows\\apocalyps32.exe" apocalyps32.exe -
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral1/memory/2164-13-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2164-30-0x0000000002B90000-0x0000000002BCB000-memory.dmp modiloader_stage2 behavioral1/memory/2784-31-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-33-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-34-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-35-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-36-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-37-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-38-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-39-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-40-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-41-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-42-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-43-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-44-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 behavioral1/memory/2784-45-0x0000000030000000-0x000000003003B000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2784 apocalyps32.exe -
resource yara_rule behavioral1/memory/2164-0-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2164-6-0x0000000002B90000-0x0000000002BCB000-memory.dmp upx behavioral1/files/0x0009000000019244-27.dat upx behavioral1/memory/2164-13-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2164-30-0x0000000002B90000-0x0000000002BCB000-memory.dmp upx behavioral1/memory/2784-31-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-33-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-34-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-35-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-36-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-37-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-38-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-39-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-40-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-41-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-42-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-43-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-44-0x0000000030000000-0x000000003003B000-memory.dmp upx behavioral1/memory/2784-45-0x0000000030000000-0x000000003003B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\apocalyps32 = "C:\\Windows\\apocalyps32.exe" apocalyps32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe File opened for modification C:\Windows\apocalyps32.exe b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2784 apocalyps32.exe 2776 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2784 apocalyps32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2784 2164 b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2784 2164 b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2784 2164 b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe 31 PID 2164 wrote to memory of 2784 2164 b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe 31 PID 2784 wrote to memory of 1184 2784 apocalyps32.exe 21 PID 2784 wrote to memory of 1184 2784 apocalyps32.exe 21 PID 2784 wrote to memory of 1184 2784 apocalyps32.exe 21 PID 2784 wrote to memory of 1184 2784 apocalyps32.exe 21 PID 2784 wrote to memory of 1184 2784 apocalyps32.exe 21 PID 2784 wrote to memory of 1184 2784 apocalyps32.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4de47e58c8312eeaa697d0fb606e085_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\apocalyps32.exe-bs3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2776
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD54df3bf984bc27b087d238e8f54230402
SHA130dae9651faa13a3c517755965813d266d794c46
SHA25612650687a846bd64d5b0422fe30e47bf93b3023469aac653aa767dd08977684d
SHA512b65e17c5e95080f715f6d104a3203140ee949a60d678c95a5a7c26c72caa915368958effdbaaba06c7681295428ca9ebf8213653112e4bf90e166f16966b4690
-
Filesize
102KB
MD5b4de47e58c8312eeaa697d0fb606e085
SHA150be87a9abd6a23088e560690fb4f6ec97fc7bda
SHA2564cb99d81ccfa83ea7dacbfe068f11b1d01eddad916a5333b50c4d1807b333698
SHA51266ad01cb087dacc6141fa5bc5c99e5e1f1cecdc84cd7928760ccf32369d9ccd08c8092441c7da46aa567934ea34614f1be68eaa1c04d1f7ce457115bf2f68da9