Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe
-
Size
541KB
-
MD5
cecff36c1ce1c5204617f27b9f6207fd
-
SHA1
eedbbd2c11bec294daaf5314ce19e25c15b404f0
-
SHA256
020e562d225d0ebc97171e5fefc7a86ee01c2a1a5f5090fa00e49c5e65ab8f1a
-
SHA512
139daf99a16bb87b2f84feb9d70ab76b68fa5220beb067732ecfcc1034f37cf466817083ac8d9cf6abca77ae69e326122683ceb2b01674e49514a64670d3a3da
-
SSDEEP
12288:WH3hTUjHVfmbTt7GI3YDIfY5owVMnyn2CkeXN0sR/etsdyKEp:WXGrVeSyYCHnyTkeXWsVe8k
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/3024-33-0x00000000002E0000-0x0000000000345000-memory.dmp modiloader_stage2 behavioral1/memory/3024-37-0x00000000002E0000-0x0000000000345000-memory.dmp modiloader_stage2 behavioral1/memory/3024-41-0x00000000002E0000-0x0000000000345000-memory.dmp modiloader_stage2 behavioral1/memory/3024-45-0x00000000002E0000-0x0000000000345000-memory.dmp modiloader_stage2 behavioral1/memory/3024-49-0x00000000002E0000-0x0000000000345000-memory.dmp modiloader_stage2 behavioral1/memory/3024-53-0x00000000002E0000-0x0000000000345000-memory.dmp modiloader_stage2 behavioral1/memory/3024-57-0x00000000002E0000-0x0000000000345000-memory.dmp modiloader_stage2 -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Çý¶¯\Parameters\ServiceDll = "C:\\Windows\\system32\\swqs.dll" 12.04.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000018c8e-27.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2272 Å©ÃñQQÃܱ£´óµÁ.exe 2840 12.04.exe -
Loads dropped DLL 5 IoCs
pid Process 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 3024 svchost.exe -
resource yara_rule behavioral1/files/0x0006000000018c8e-27.dat upx behavioral1/memory/3024-29-0x00000000002E0000-0x0000000000345000-memory.dmp upx behavioral1/memory/3024-33-0x00000000002E0000-0x0000000000345000-memory.dmp upx behavioral1/memory/3024-37-0x00000000002E0000-0x0000000000345000-memory.dmp upx behavioral1/memory/3024-41-0x00000000002E0000-0x0000000000345000-memory.dmp upx behavioral1/memory/3024-45-0x00000000002E0000-0x0000000000345000-memory.dmp upx behavioral1/memory/3024-49-0x00000000002E0000-0x0000000000345000-memory.dmp upx behavioral1/memory/3024-53-0x00000000002E0000-0x0000000000345000-memory.dmp upx behavioral1/memory/3024-57-0x00000000002E0000-0x0000000000345000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\swqs.dll 12.04.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe File created C:\Windows\SysWOW64\mon.dll 12.04.exe File opened for modification C:\Windows\SysWOW64\mon.dll 12.04.exe File created C:\Windows\SysWOW64\swqs.dll 12.04.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Å©ÃñQQÃܱ£´óµÁ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12.04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2272 Å©ÃñQQÃܱ£´óµÁ.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2272 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2272 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2272 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2272 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 29 PID 1120 wrote to memory of 2840 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 30 PID 1120 wrote to memory of 2840 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 30 PID 1120 wrote to memory of 2840 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 30 PID 1120 wrote to memory of 2840 1120 cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe 30 PID 2840 wrote to memory of 2948 2840 12.04.exe 32 PID 2840 wrote to memory of 2948 2840 12.04.exe 32 PID 2840 wrote to memory of 2948 2840 12.04.exe 32 PID 2840 wrote to memory of 2948 2840 12.04.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cecff36c1ce1c5204617f27b9f6207fd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\Å©ÃñQQÃܱ£´óµÁ.exe"C:\Users\Admin\AppData\Local\Temp\Å©ÃñQQÃܱ£´óµÁ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\12.04.exe"C:\Users\Admin\AppData\Local\Temp\12.04.exe"2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\12.04.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k network1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD575542d8676e3afb9efde7234763e7f6c
SHA1c14a551a3109ea068e17631df1575e5a93290f31
SHA256b3dfc5a951f84abb59e140c2d8aba60ef9bb3e3546083c1aa1d2aa6850580726
SHA5125154e191521d7341dca76241617aa31ca1c2fc2cabe26aad425888047b783ca6b717dba51c20fdbf3d33f1422e7db1f31d7caa0db11e15fbac71d60ef6f75fee
-
Filesize
874KB
MD502b5e217cb894eb9109ed525b3e4a877
SHA16a77e5468a5d08afe81714f02fd23b8386c018c5
SHA2567c67d0fba4cd364b77ff90bebf967c7ff4f135d47c2531351b99b2edf6a37da3
SHA5129e512d0be8c0c90e36adf95d72e36f4afa94b40e946d1e7bc03febd87ef9c5a9e5573431c5f1cf64a031ea940ed1c582711783d1aa13c4331beee18276dcd043
-
Filesize
143KB
MD58a856ee6f30ac3bf78c55822deeb209e
SHA1fdd361c569c9413412962d30e0f4d83ea9e4e711
SHA256eaba8df4ea507410b550aceaab707eea7bb5d2ad7dc10dc14b73db54bd28aba2
SHA5128e71a77cc0d9fef92dff2863c39d095284a216ea27ffdab5a917e5a8942be1127a57c0903334cb56c3462c7d7b3cff9af4234504f4893dc62e37d48a722a923a