Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe
-
Size
895KB
-
MD5
d02cf694547066ba3c841a907467d57c
-
SHA1
be70b97106bbf8b8c7222cf013ca3ca7c75af292
-
SHA256
2fa7a023201029f2d844fcf56dab673930bd24fe6cda970f07ccda3cd142585b
-
SHA512
a14a90d2adde0db27e686872c4f36c6532231c7ea7ad2709362a6506300c5a8e0627e4a2dcdd7f43b1ee65b6275bf7fa4ac19f54d8baed744946a43eb93f5354
-
SSDEEP
12288:LUOE4J/4c0vQn9Gidye1+uowo81NkEF3Z4mxxxz2wTepTjV8wxLDmxL:LVR4cFXBowo3EQmXxz2wTep/HxkL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/4344-52-0x0000000000400000-0x000000000053A000-memory.dmp modiloader_stage2 behavioral2/memory/2744-54-0x0000000000400000-0x000000000053A000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2744 explorers.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\X: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\A: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\G: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\M: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\P: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\R: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\S: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\O: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\Q: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\B: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\E: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\I: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\J: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\K: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\N: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\T: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\V: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\Y: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\L: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\W: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\H: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened (read-only) \??\Z: d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File created C:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened for modification C:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File created F:\AutoRun.inf d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_explorers.exe explorers.exe File opened for modification C:\Windows\SysWOW64\_explorers.exe explorers.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3440 2744 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorers.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4344 wrote to memory of 2744 4344 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 86 PID 4344 wrote to memory of 2744 4344 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 86 PID 4344 wrote to memory of 2744 4344 d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe 86 PID 2744 wrote to memory of 4508 2744 explorers.exe 87 PID 2744 wrote to memory of 4508 2744 explorers.exe 87 PID 2744 wrote to memory of 4508 2744 explorers.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d02cf694547066ba3c841a907467d57c_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\explorers.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 6843⤵
- Program crash
PID:3440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2744 -ip 27441⤵PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895KB
MD5d02cf694547066ba3c841a907467d57c
SHA1be70b97106bbf8b8c7222cf013ca3ca7c75af292
SHA2562fa7a023201029f2d844fcf56dab673930bd24fe6cda970f07ccda3cd142585b
SHA512a14a90d2adde0db27e686872c4f36c6532231c7ea7ad2709362a6506300c5a8e0627e4a2dcdd7f43b1ee65b6275bf7fa4ac19f54d8baed744946a43eb93f5354