Analysis
-
max time kernel
126s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:51
Behavioral task
behavioral1
Sample
d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe
-
Size
642KB
-
MD5
d23059b6f4695570243cc79f1bf23ae5
-
SHA1
677b0e699c8c514206c2278b1b07675da1e2ffc6
-
SHA256
2794d450e522f3bcd95a8af8530755a5c11b1323e28e63951088911eff0199e1
-
SHA512
c007bfb30222ff39e71b3ae5c888b000ee903c6857756ee90993452cbdfec69896ebde3fafdbd0acd0b84549b50d691d8eec615423fcd4e62cef8b47c59debcb
-
SSDEEP
12288:H0b3M2b6Ea399VgWhTa+7FAsrXIrjy/+jZivkXiJiMGIv1VsSuYON:HCFa3ygaYFAsEjDZ84iJiMD3sSuN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/4704-28-0x0000000000400000-0x000000000051C000-memory.dmp modiloader_stage2 behavioral2/memory/3708-33-0x0000000000400000-0x000000000051C000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/files/0x000c00000002362d-20.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3708 rejoice101.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe File opened for modification C:\Windows\SysWOW64\_rejoice101.exe rejoice101.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3708 set thread context of 392 3708 rejoice101.exe 100 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 3608 4704 WerFault.exe 89 1624 3708 WerFault.exe 97 2232 392 WerFault.exe 100 3368 3708 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice101.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3708 4704 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 97 PID 4704 wrote to memory of 3708 4704 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 97 PID 4704 wrote to memory of 3708 4704 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 97 PID 3708 wrote to memory of 392 3708 rejoice101.exe 100 PID 3708 wrote to memory of 392 3708 rejoice101.exe 100 PID 3708 wrote to memory of 392 3708 rejoice101.exe 100 PID 3708 wrote to memory of 392 3708 rejoice101.exe 100 PID 3708 wrote to memory of 392 3708 rejoice101.exe 100 PID 3708 wrote to memory of 3252 3708 rejoice101.exe 101 PID 3708 wrote to memory of 3252 3708 rejoice101.exe 101 PID 4704 wrote to memory of 3472 4704 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 106 PID 4704 wrote to memory of 3472 4704 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 106 PID 4704 wrote to memory of 3472 4704 d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d23059b6f4695570243cc79f1bf23ae5_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 5322⤵
- Program crash
PID:3608
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 5323⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 244⤵
- Program crash
PID:2232
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 6883⤵
- Program crash
PID:3368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat""2⤵
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4704 -ip 47041⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3708 -ip 37081⤵PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 392 -ip 3921⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3708 -ip 37081⤵PID:4428
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4164 /prefetch:81⤵PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c45e21624fe5d41f8be0c0a882658e96
SHA1e0ec74a29f9f5c6c5702f79dcfbc4d9b58de1fdc
SHA2569979f2dc6f02d1e34dd716107b29e063f289463a21225a05b4b643379ef97ce2
SHA51229edf11ab2230335533ce4c666ef1519ab7d65f5039a1c6a70baa8de12aca15e101c4be8918eb0e3bf40f6c4c240a86120c6c78c27505b810eb77e49e67955d8
-
Filesize
642KB
MD5d23059b6f4695570243cc79f1bf23ae5
SHA1677b0e699c8c514206c2278b1b07675da1e2ffc6
SHA2562794d450e522f3bcd95a8af8530755a5c11b1323e28e63951088911eff0199e1
SHA512c007bfb30222ff39e71b3ae5c888b000ee903c6857756ee90993452cbdfec69896ebde3fafdbd0acd0b84549b50d691d8eec615423fcd4e62cef8b47c59debcb