Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 14:51
Behavioral task
behavioral1
Sample
d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe
-
Size
642KB
-
MD5
d23059b6f4695570243cc79f1bf23ae5
-
SHA1
677b0e699c8c514206c2278b1b07675da1e2ffc6
-
SHA256
2794d450e522f3bcd95a8af8530755a5c11b1323e28e63951088911eff0199e1
-
SHA512
c007bfb30222ff39e71b3ae5c888b000ee903c6857756ee90993452cbdfec69896ebde3fafdbd0acd0b84549b50d691d8eec615423fcd4e62cef8b47c59debcb
-
SSDEEP
12288:H0b3M2b6Ea399VgWhTa+7FAsrXIrjy/+jZivkXiJiMGIv1VsSuYON:HCFa3ygaYFAsEjDZ84iJiMD3sSuN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2036-35-0x0000000000400000-0x000000000051C000-memory.dmp modiloader_stage2 behavioral1/memory/2288-36-0x0000000000400000-0x000000000051C000-memory.dmp modiloader_stage2 behavioral1/memory/2036-48-0x0000000000400000-0x000000000051C000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/files/0x000a000000015685-19.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2380 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2288 rejoice101.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe File opened for modification C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 2764 2288 rejoice101.exe 32 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2668 2288 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2288 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 31 PID 2036 wrote to memory of 2288 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 31 PID 2036 wrote to memory of 2288 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 31 PID 2036 wrote to memory of 2288 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2764 2288 rejoice101.exe 32 PID 2288 wrote to memory of 2764 2288 rejoice101.exe 32 PID 2288 wrote to memory of 2764 2288 rejoice101.exe 32 PID 2288 wrote to memory of 2764 2288 rejoice101.exe 32 PID 2288 wrote to memory of 2764 2288 rejoice101.exe 32 PID 2288 wrote to memory of 2764 2288 rejoice101.exe 32 PID 2288 wrote to memory of 2696 2288 rejoice101.exe 33 PID 2288 wrote to memory of 2696 2288 rejoice101.exe 33 PID 2288 wrote to memory of 2696 2288 rejoice101.exe 33 PID 2288 wrote to memory of 2696 2288 rejoice101.exe 33 PID 2288 wrote to memory of 2668 2288 rejoice101.exe 34 PID 2288 wrote to memory of 2668 2288 rejoice101.exe 34 PID 2288 wrote to memory of 2668 2288 rejoice101.exe 34 PID 2288 wrote to memory of 2668 2288 rejoice101.exe 34 PID 2036 wrote to memory of 2380 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 35 PID 2036 wrote to memory of 2380 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 35 PID 2036 wrote to memory of 2380 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 35 PID 2036 wrote to memory of 2380 2036 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2764
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 3123⤵
- Program crash
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c45e21624fe5d41f8be0c0a882658e96
SHA1e0ec74a29f9f5c6c5702f79dcfbc4d9b58de1fdc
SHA2569979f2dc6f02d1e34dd716107b29e063f289463a21225a05b4b643379ef97ce2
SHA51229edf11ab2230335533ce4c666ef1519ab7d65f5039a1c6a70baa8de12aca15e101c4be8918eb0e3bf40f6c4c240a86120c6c78c27505b810eb77e49e67955d8
-
Filesize
642KB
MD5d23059b6f4695570243cc79f1bf23ae5
SHA1677b0e699c8c514206c2278b1b07675da1e2ffc6
SHA2562794d450e522f3bcd95a8af8530755a5c11b1323e28e63951088911eff0199e1
SHA512c007bfb30222ff39e71b3ae5c888b000ee903c6857756ee90993452cbdfec69896ebde3fafdbd0acd0b84549b50d691d8eec615423fcd4e62cef8b47c59debcb