Analysis
-
max time kernel
131s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe
-
Size
643KB
-
MD5
ccea1198a326c15b72285a942aff0c64
-
SHA1
eec183a9e21996ee730931934ef8e8e0e88e5276
-
SHA256
885e9e497a71bc31ef930965ca4398690b9c514440ea7aadf677aa7119defd9d
-
SHA512
65eca0142bf70363165943dfdaaa6f89ce9c424d0010c4b2c56aa84db408599e7b80cd82de96d4b870da7e3f2b5856a109b22f5e55e239fd6ecf2348dfd4c2bd
-
SSDEEP
12288:/kmD9K3M389N8/kr7udEFqeVGF3Z4mxxr4IxSo62jDrkAT:/kKI3MrsfFqpQmXPsohk8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/5024-60-0x0000000000400000-0x0000000000511000-memory.dmp modiloader_stage2 behavioral2/memory/4984-63-0x0000000000400000-0x0000000000511000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4984 Microsoft Office.doc -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\_Microsoft Office.doc Microsoft Office.doc File created C:\Windows\SysWOW64\_Microsoft Office.doc Microsoft Office.doc -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Microsoft Office.doc ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\Microsoft Office.doc ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2220 4984 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Office.doc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5024 wrote to memory of 4984 5024 ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe 87 PID 5024 wrote to memory of 4984 5024 ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe 87 PID 5024 wrote to memory of 4984 5024 ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe 87 PID 4984 wrote to memory of 3036 4984 Microsoft Office.doc 88 PID 4984 wrote to memory of 3036 4984 Microsoft Office.doc 88 PID 4984 wrote to memory of 3036 4984 Microsoft Office.doc 88 PID 5024 wrote to memory of 2672 5024 ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe 93 PID 5024 wrote to memory of 2672 5024 ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe 93 PID 5024 wrote to memory of 2672 5024 ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ccea1198a326c15b72285a942aff0c64_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Microsoft Office.doc"C:\Program Files\Common Files\Microsoft Shared\MSINFO\Microsoft Office.doc"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 6803⤵
- Program crash
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""2⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4984 -ip 49841⤵PID:3188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD509849e724011fe963ecbef353d381347
SHA1cfc67163108a1a004e0f96d2f2758ba0a876738a
SHA256c1b2d9766aaa0e719b8c134fc671c845b44ce34fcf4886eea20f9a3e95dffcd1
SHA512dfd5ca40bc6497871a1c0c2923797abf5b72763917987c0ec792acd9ddb020dd8701caab68597177b0b23481906a200c52e7446fde0dfb4d4d7fa8991ac87f1a
-
Filesize
643KB
MD5ccea1198a326c15b72285a942aff0c64
SHA1eec183a9e21996ee730931934ef8e8e0e88e5276
SHA256885e9e497a71bc31ef930965ca4398690b9c514440ea7aadf677aa7119defd9d
SHA51265eca0142bf70363165943dfdaaa6f89ce9c424d0010c4b2c56aa84db408599e7b80cd82de96d4b870da7e3f2b5856a109b22f5e55e239fd6ecf2348dfd4c2bd