Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe
-
Size
683KB
-
MD5
d2abb9bfc24c04408b2b30f975b2e04d
-
SHA1
65a94a615886ab4c29e2339983f4fe0dff0a6eda
-
SHA256
723c37d9264fb5328e0c266a919acbb165b13f31f4c973e3e5f2d6a693ebef64
-
SHA512
6730570439fb66d1af6497e3986b700f35e448f991056729a3464248646ca3c4a49ed61afcbc6b77a4a693ae7d5bfb28f81c0ce687dec95ba7b444bc8ff67016
-
SSDEEP
12288:qB59tGKgLueUklEEBgpybO+OPCXeF3Z4mxxz+hlMkN0J6Yy7hNtp/SJi:MOndEEBgp8O+OKXeQmXz+skNcl0Ss
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/3008-75-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 behavioral1/memory/2788-80-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 behavioral1/memory/3008-92-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2064 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2788 rejoice47.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2788 set thread context of 2704 2788 rejoice47.exe 31 -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\_rejoice47.exe rejoice47.exe File created C:\Windows\SetupDel.bat d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe File created C:\Windows\rejoice47.exe d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe File opened for modification C:\Windows\rejoice47.exe d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2828 2788 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2788 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2788 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2788 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2788 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2704 2788 rejoice47.exe 31 PID 2788 wrote to memory of 2704 2788 rejoice47.exe 31 PID 2788 wrote to memory of 2704 2788 rejoice47.exe 31 PID 2788 wrote to memory of 2704 2788 rejoice47.exe 31 PID 2788 wrote to memory of 2704 2788 rejoice47.exe 31 PID 2788 wrote to memory of 2704 2788 rejoice47.exe 31 PID 2788 wrote to memory of 2828 2788 rejoice47.exe 32 PID 2788 wrote to memory of 2828 2788 rejoice47.exe 32 PID 2788 wrote to memory of 2828 2788 rejoice47.exe 32 PID 2788 wrote to memory of 2828 2788 rejoice47.exe 32 PID 3008 wrote to memory of 2064 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2064 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2064 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2064 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2064 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2064 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 34 PID 3008 wrote to memory of 2064 3008 d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2abb9bfc24c04408b2b30f975b2e04d_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\rejoice47.exeC:\Windows\rejoice47.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 3003⤵
- Program crash
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SetupDel.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD57cff697ac9b8df5f10be9795f85855f6
SHA1e9acaf62eb9ce5336452da276b97a9ea75467194
SHA2562357dc30cf94da09eca9726d439b899568367a2a3a17436e9be3203028ca8936
SHA512283dcd94ac17e19586cae09d3b1265791e0c423a525fc7dab30c8c58721967db32e2e65bc25ea4e23993b392bc0c96b6648d4629d0963c4b8f0fd09bfe8efb29
-
Filesize
683KB
MD5d2abb9bfc24c04408b2b30f975b2e04d
SHA165a94a615886ab4c29e2339983f4fe0dff0a6eda
SHA256723c37d9264fb5328e0c266a919acbb165b13f31f4c973e3e5f2d6a693ebef64
SHA5126730570439fb66d1af6497e3986b700f35e448f991056729a3464248646ca3c4a49ed61afcbc6b77a4a693ae7d5bfb28f81c0ce687dec95ba7b444bc8ff67016