Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe
-
Size
586KB
-
MD5
d005e4fbec1d47ff2fda1c9859ff22c7
-
SHA1
6daee6de7141a16440eabaf91452c6497b9a3b7a
-
SHA256
f22e5a7a91f28b73d378e61834738b502b0106851c34957876156489bad8f810
-
SHA512
3c46fe7b866c42bdecc01bd44bfdc7ee426970e0deb90d516ed4ba21e012278afd85f9d045f3fb5ed4b144d61886c7e6f253b06e67a6a4aab76917f49b58bbbc
-
SSDEEP
12288:QHTwrQZxG/tmQMqdTyp+JgwkgbF3Z4mxxJv9wkaoxF:JQZx4RMZVRgbQmXJvgoP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 24 IoCs
resource yara_rule behavioral1/memory/2476-48-0x0000000000400000-0x0000000000559000-memory.dmp modiloader_stage2 behavioral1/memory/2476-57-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-58-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-59-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-76-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-77-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-75-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-74-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-73-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-72-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-71-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-70-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-69-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-68-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-67-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-66-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-65-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-64-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-63-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-62-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-61-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2476-60-0x0000000003270000-0x000000000331F000-memory.dmp modiloader_stage2 behavioral1/memory/2684-81-0x0000000000400000-0x0000000000559000-memory.dmp modiloader_stage2 behavioral1/memory/2476-87-0x0000000000400000-0x0000000000559000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2684 Server101.exe -
Loads dropped DLL 5 IoCs
pid Process 2476 d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe 2476 d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe 2940 WerFault.exe 2940 WerFault.exe 2940 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\L: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\O: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\S: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\T: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\W: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\B: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\E: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\K: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\Z: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\U: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\V: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\X: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\A: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\J: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\M: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\N: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\P: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\Q: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\R: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\Y: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\H: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened (read-only) \??\I: d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened for modification C:\AutoRun.inf d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File created F:\AutoRun.inf d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened for modification F:\AutoRun.inf d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server101.exe d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server101.exe d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2940 2684 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server101.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2684 2476 d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe 31 PID 2476 wrote to memory of 2684 2476 d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe 31 PID 2476 wrote to memory of 2684 2476 d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe 31 PID 2476 wrote to memory of 2684 2476 d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2940 2684 Server101.exe 32 PID 2684 wrote to memory of 2940 2684 Server101.exe 32 PID 2684 wrote to memory of 2940 2684 Server101.exe 32 PID 2684 wrote to memory of 2940 2684 Server101.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d005e4fbec1d47ff2fda1c9859ff22c7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server101.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server101.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 3043⤵
- Loads dropped DLL
- Program crash
PID:2940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
586KB
MD5d005e4fbec1d47ff2fda1c9859ff22c7
SHA16daee6de7141a16440eabaf91452c6497b9a3b7a
SHA256f22e5a7a91f28b73d378e61834738b502b0106851c34957876156489bad8f810
SHA5123c46fe7b866c42bdecc01bd44bfdc7ee426970e0deb90d516ed4ba21e012278afd85f9d045f3fb5ed4b144d61886c7e6f253b06e67a6a4aab76917f49b58bbbc