Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe
-
Size
575KB
-
MD5
cd0f474d0d7b5ded430f896b825f2369
-
SHA1
49a09d620bf8681b7f9eb3ed8300f48cc357b1a9
-
SHA256
4c63ef32f54ad2c1721f0b339823060fc5b45e739c6ab835ed7e6923ad423cea
-
SHA512
471f5e4f355a0053b9e10323256b9a08176df27bc22bd7da01d8dd34822b404f4cac3c0b960df83a97fca3e51a1d8320ef8525f6239ab6b11faaa752729ce953
-
SSDEEP
12288:UMOjpD8p8jN+5M2wkze0cb9xvo28GoIE1c2obY7zWBULDQ/gq4:UMOjR0w85Kf0WBo2tmocEE
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2116-36-0x0000000000400000-0x0000000000508000-memory.dmp modiloader_stage2 behavioral1/memory/2624-39-0x0000000000400000-0x0000000000508000-memory.dmp modiloader_stage2 behavioral1/memory/2116-53-0x0000000000400000-0x0000000000508000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1656 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2624 rejoice46.exe -
Loads dropped DLL 2 IoCs
pid Process 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe File created C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2624 set thread context of 2428 2624 rejoice46.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2612 2624 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice46.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2624 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2624 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2624 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2624 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2428 2624 rejoice46.exe 31 PID 2624 wrote to memory of 2428 2624 rejoice46.exe 31 PID 2624 wrote to memory of 2428 2624 rejoice46.exe 31 PID 2624 wrote to memory of 2428 2624 rejoice46.exe 31 PID 2624 wrote to memory of 2428 2624 rejoice46.exe 31 PID 2624 wrote to memory of 2428 2624 rejoice46.exe 31 PID 2624 wrote to memory of 2712 2624 rejoice46.exe 32 PID 2624 wrote to memory of 2712 2624 rejoice46.exe 32 PID 2624 wrote to memory of 2712 2624 rejoice46.exe 32 PID 2624 wrote to memory of 2712 2624 rejoice46.exe 32 PID 2624 wrote to memory of 2612 2624 rejoice46.exe 33 PID 2624 wrote to memory of 2612 2624 rejoice46.exe 33 PID 2624 wrote to memory of 2612 2624 rejoice46.exe 33 PID 2624 wrote to memory of 2612 2624 rejoice46.exe 33 PID 2116 wrote to memory of 1656 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 34 PID 2116 wrote to memory of 1656 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 34 PID 2116 wrote to memory of 1656 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 34 PID 2116 wrote to memory of 1656 2116 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2428
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 3123⤵
- Program crash
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD53da436a0858257df283a9a8b3c12eaaa
SHA12ef9bf7dcde19da5b2230aae858985294dede9d0
SHA2569126fc45676fabc4ff8f4cf8083b4aedebf77678eb8fc05a220d68bf1330acca
SHA512b29624425139837943c437067d51a6de74895a2c782ea015ebfe1a1e350f5eeea1dfeeca3718e0127923d593b6076ce9c2ef69044a9659ccd623081b790c3257
-
Filesize
575KB
MD5cd0f474d0d7b5ded430f896b825f2369
SHA149a09d620bf8681b7f9eb3ed8300f48cc357b1a9
SHA2564c63ef32f54ad2c1721f0b339823060fc5b45e739c6ab835ed7e6923ad423cea
SHA512471f5e4f355a0053b9e10323256b9a08176df27bc22bd7da01d8dd34822b404f4cac3c0b960df83a97fca3e51a1d8320ef8525f6239ab6b11faaa752729ce953