Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 09:33
Behavioral task
behavioral1
Sample
cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe
-
Size
265KB
-
MD5
cc901f826af1ac38365de4c4eeb545d5
-
SHA1
edccc2e480708c69e2c475b3d2e18b5a9e1cb340
-
SHA256
2aa702ad5ec863508dbdae9eeb27552031bc72d522cf29684d1ff972d2a3eb09
-
SHA512
3d4ca47a2ade27f1089b9ec0edcfd7fde9a450e7502d4204b64e90a1f1c7cb11ecf51938e4ee768aa988f2f96830356b3db6ca6a2e0af8c4263a203e050fdbb3
-
SSDEEP
6144:8vKpppOTRfjSl9LmXnzHgzVdmr0csOvRRq+v16neNysj7yzf/A:F0RfjS/yem4cso82EzfI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2116-8-0x0000000000400000-0x0000000000449000-memory.dmp modiloader_stage2 -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00070000000186f7-12.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2404 äÓÎ ãä C.exe -
Loads dropped DLL 3 IoCs
pid Process 2116 cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe 2116 cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe 2404 äÓÎ ãä C.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language äÓÎ ãä C.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2404 äÓÎ ãä C.exe 2404 äÓÎ ãä C.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 äÓÎ ãä C.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2404 2116 cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2404 2116 cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2404 2116 cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2404 2116 cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe 30 PID 2404 wrote to memory of 1220 2404 äÓÎ ãä C.exe 21 PID 2404 wrote to memory of 1220 2404 äÓÎ ãä C.exe 21 PID 2404 wrote to memory of 1220 2404 äÓÎ ãä C.exe 21 PID 2404 wrote to memory of 1220 2404 äÓÎ ãä C.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cc901f826af1ac38365de4c4eeb545d5_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\äÓÎ ãä C.exe"C:\Users\Admin\AppData\Local\Temp\äÓÎ ãä C.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9
-
Filesize
253KB
MD55f850d830c15eec6f874dcc7377a4347
SHA1dcb52969ee218d457a96f2827e410eeceab04aee
SHA256159a41ac2a2d7f61205c6e1d0a11569770aa7dcfbe6c2936d0579c2f63937cde
SHA51283c174cf3faaaf713753e29332aae1a670c28bba0d209557f5310c1d8d4a7e959f97c689f72321ec4c1293c3484e90593d736ed3be4a000ff1c873f89bacfef1