Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
b939d947074246b421f1b7f165f85936_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b939d947074246b421f1b7f165f85936_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b939d947074246b421f1b7f165f85936_JaffaCakes118.exe
-
Size
420KB
-
MD5
b939d947074246b421f1b7f165f85936
-
SHA1
c37d9dd9aacf2143a9d3b0d44790e8042cb39ba1
-
SHA256
3a24be46cc182091093743debf8490b716432f00a267869ae26bddd1bf820380
-
SHA512
be2c0ffaf81ebbd900949321c64f8171b2c677b5972ad59abf44de7d7c497a124b027749f30b784ccbfb77fc49cbb43b193998f97a2d4d5075c204a2feb99b04
-
SSDEEP
12288:doFLFGmAW84w3rNZruN+Ga3QuivnNnwS+wRllBa2:oGJnrNZrGdllU2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral1/memory/2004-0-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 behavioral1/memory/2004-1-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 behavioral1/memory/2004-4-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 behavioral1/memory/2004-3-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 behavioral1/memory/536-14-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 behavioral1/memory/536-15-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 behavioral1/memory/2004-29-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 behavioral1/memory/2004-37-0x0000000000400000-0x00000000004DB638-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1948 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 536 svzhost.exe -
Loads dropped DLL 5 IoCs
pid Process 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 1848 WerFault.exe 1848 WerFault.exe 1848 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 536 set thread context of 2984 536 svzhost.exe 32 -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat b939d947074246b421f1b7f165f85936_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\svzhost.exe b939d947074246b421f1b7f165f85936_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\svzhost.exe b939d947074246b421f1b7f165f85936_JaffaCakes118.exe File created C:\Program Files\_svzhost.exe svzhost.exe File opened for modification C:\Program Files\_svzhost.exe svzhost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1848 536 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939d947074246b421f1b7f165f85936_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svzhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2004 wrote to memory of 536 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 31 PID 2004 wrote to memory of 536 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 31 PID 2004 wrote to memory of 536 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 31 PID 2004 wrote to memory of 536 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 31 PID 536 wrote to memory of 2984 536 svzhost.exe 32 PID 536 wrote to memory of 2984 536 svzhost.exe 32 PID 536 wrote to memory of 2984 536 svzhost.exe 32 PID 536 wrote to memory of 2984 536 svzhost.exe 32 PID 536 wrote to memory of 2984 536 svzhost.exe 32 PID 536 wrote to memory of 2984 536 svzhost.exe 32 PID 536 wrote to memory of 1848 536 svzhost.exe 33 PID 536 wrote to memory of 1848 536 svzhost.exe 33 PID 536 wrote to memory of 1848 536 svzhost.exe 33 PID 536 wrote to memory of 1848 536 svzhost.exe 33 PID 2004 wrote to memory of 1948 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 34 PID 2004 wrote to memory of 1948 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 34 PID 2004 wrote to memory of 1948 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 34 PID 2004 wrote to memory of 1948 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 34 PID 2004 wrote to memory of 1948 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 34 PID 2004 wrote to memory of 1948 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 34 PID 2004 wrote to memory of 1948 2004 b939d947074246b421f1b7f165f85936_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b939d947074246b421f1b7f165f85936_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b939d947074246b421f1b7f165f85936_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\svzhost.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\svzhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5cc7a81c86a89570a36a0292efecc0b98
SHA1f7d81808ed360793e934a768af09b8234a959427
SHA2566f7b221b5112b057496cfef024c15a46fdd2e9e578633dab3ed5bda0d3ca0303
SHA51204383d7cfc5893825be59a2dc691591d2d99583734b0d462895cb751787e83931f236e2579ba59587ab44643761ef07a53c1178ebc87a35dce59c90b22f56eb9
-
Filesize
420KB
MD5b939d947074246b421f1b7f165f85936
SHA1c37d9dd9aacf2143a9d3b0d44790e8042cb39ba1
SHA2563a24be46cc182091093743debf8490b716432f00a267869ae26bddd1bf820380
SHA512be2c0ffaf81ebbd900949321c64f8171b2c677b5972ad59abf44de7d7c497a124b027749f30b784ccbfb77fc49cbb43b193998f97a2d4d5075c204a2feb99b04