Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe
-
Size
575KB
-
MD5
cd0f474d0d7b5ded430f896b825f2369
-
SHA1
49a09d620bf8681b7f9eb3ed8300f48cc357b1a9
-
SHA256
4c63ef32f54ad2c1721f0b339823060fc5b45e739c6ab835ed7e6923ad423cea
-
SHA512
471f5e4f355a0053b9e10323256b9a08176df27bc22bd7da01d8dd34822b404f4cac3c0b960df83a97fca3e51a1d8320ef8525f6239ab6b11faaa752729ce953
-
SSDEEP
12288:UMOjpD8p8jN+5M2wkze0cb9xvo28GoIE1c2obY7zWBULDQ/gq4:UMOjR0w85Kf0WBo2tmocEE
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/864-28-0x0000000000400000-0x0000000000508000-memory.dmp modiloader_stage2 behavioral2/memory/1360-31-0x0000000000400000-0x0000000000508000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1360 rejoice46.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe File opened for modification C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1360 set thread context of 4872 1360 rejoice46.exe 90 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2344 1360 WerFault.exe 89 4864 4872 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 864 wrote to memory of 1360 864 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 89 PID 864 wrote to memory of 1360 864 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 89 PID 864 wrote to memory of 1360 864 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 89 PID 1360 wrote to memory of 4872 1360 rejoice46.exe 90 PID 1360 wrote to memory of 4872 1360 rejoice46.exe 90 PID 1360 wrote to memory of 4872 1360 rejoice46.exe 90 PID 1360 wrote to memory of 4872 1360 rejoice46.exe 90 PID 1360 wrote to memory of 4872 1360 rejoice46.exe 90 PID 1360 wrote to memory of 2760 1360 rejoice46.exe 91 PID 1360 wrote to memory of 2760 1360 rejoice46.exe 91 PID 864 wrote to memory of 4688 864 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 98 PID 864 wrote to memory of 4688 864 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 98 PID 864 wrote to memory of 4688 864 cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 124⤵
- Program crash
PID:4864
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 6923⤵
- Program crash
PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""2⤵
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1360 -ip 13601⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4872 -ip 48721⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD53da436a0858257df283a9a8b3c12eaaa
SHA12ef9bf7dcde19da5b2230aae858985294dede9d0
SHA2569126fc45676fabc4ff8f4cf8083b4aedebf77678eb8fc05a220d68bf1330acca
SHA512b29624425139837943c437067d51a6de74895a2c782ea015ebfe1a1e350f5eeea1dfeeca3718e0127923d593b6076ce9c2ef69044a9659ccd623081b790c3257
-
Filesize
575KB
MD5cd0f474d0d7b5ded430f896b825f2369
SHA149a09d620bf8681b7f9eb3ed8300f48cc357b1a9
SHA2564c63ef32f54ad2c1721f0b339823060fc5b45e739c6ab835ed7e6923ad423cea
SHA512471f5e4f355a0053b9e10323256b9a08176df27bc22bd7da01d8dd34822b404f4cac3c0b960df83a97fca3e51a1d8320ef8525f6239ab6b11faaa752729ce953