Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe
-
Size
895KB
-
MD5
d02cf694547066ba3c841a907467d57c
-
SHA1
be70b97106bbf8b8c7222cf013ca3ca7c75af292
-
SHA256
2fa7a023201029f2d844fcf56dab673930bd24fe6cda970f07ccda3cd142585b
-
SHA512
a14a90d2adde0db27e686872c4f36c6532231c7ea7ad2709362a6506300c5a8e0627e4a2dcdd7f43b1ee65b6275bf7fa4ac19f54d8baed744946a43eb93f5354
-
SSDEEP
12288:LUOE4J/4c0vQn9Gidye1+uowo81NkEF3Z4mxxxz2wTepTjV8wxLDmxL:LVR4cFXBowo3EQmXxz2wTep/HxkL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2308-37-0x0000000000400000-0x000000000053A000-memory.dmp modiloader_stage2 behavioral1/memory/2308-51-0x00000000033A0000-0x00000000034A0000-memory.dmp modiloader_stage2 behavioral1/memory/2664-56-0x0000000000400000-0x000000000053A000-memory.dmp modiloader_stage2 behavioral1/memory/2308-61-0x0000000000400000-0x000000000053A000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2664 explorers.exe -
Loads dropped DLL 5 IoCs
pid Process 2308 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 2308 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\T: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\U: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\V: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\X: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\B: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\K: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\O: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\Z: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\I: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\E: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\L: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\M: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\P: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\Q: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\S: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\Y: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\A: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\H: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\J: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\N: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\W: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\G: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened for modification C:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File created F:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened for modification F:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_explorers.exe explorers.exe File opened for modification C:\Windows\SysWOW64\_explorers.exe explorers.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 2708 2664 explorers.exe 32 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2688 2664 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorers.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2664 2308 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2664 2308 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2664 2308 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 31 PID 2308 wrote to memory of 2664 2308 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2708 2664 explorers.exe 32 PID 2664 wrote to memory of 2708 2664 explorers.exe 32 PID 2664 wrote to memory of 2708 2664 explorers.exe 32 PID 2664 wrote to memory of 2708 2664 explorers.exe 32 PID 2664 wrote to memory of 2708 2664 explorers.exe 32 PID 2664 wrote to memory of 2708 2664 explorers.exe 32 PID 2664 wrote to memory of 2688 2664 explorers.exe 33 PID 2664 wrote to memory of 2688 2664 explorers.exe 33 PID 2664 wrote to memory of 2688 2664 explorers.exe 33 PID 2664 wrote to memory of 2688 2664 explorers.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895KB
MD5d02cf694547066ba3c841a907467d57c
SHA1be70b97106bbf8b8c7222cf013ca3ca7c75af292
SHA2562fa7a023201029f2d844fcf56dab673930bd24fe6cda970f07ccda3cd142585b
SHA512a14a90d2adde0db27e686872c4f36c6532231c7ea7ad2709362a6506300c5a8e0627e4a2dcdd7f43b1ee65b6275bf7fa4ac19f54d8baed744946a43eb93f5354