Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 16:26
Behavioral task
behavioral1
Sample
d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
d4c78b07615060668383f748381d1c9c
-
SHA1
a1b2a71f4944a1604f7c4d3b23cff25671e1b5f9
-
SHA256
b13cb35df6bb3047503dcb851185549160c114eb0ae511604d660e9b13651850
-
SHA512
d3d03809d4ba3e264c4d0115435f31e4ac026e6dbec7a4513368b0b6112ca83638d525a04fe622363dc428dd7e542538bf45e50e3b1275d986040d98777436f8
-
SSDEEP
24576:RWtMWhP2t1s5x3qeG4KUchcg2PRm6F3TITk+t:oOW+s5xDghZwbhTIo+
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/files/0x00070000000186f8-9.dat modiloader_stage2 behavioral1/memory/3060-20-0x0000000000400000-0x00000000004D0000-memory.dmp modiloader_stage2 behavioral1/memory/1764-21-0x0000000000400000-0x00000000004D0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1524 ×öºÃ×¼±¸,²»Òª¼¤¶¯Å¶!.EXE 1764 2.exe -
Loads dropped DLL 3 IoCs
pid Process 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 3060 1764 2.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt 2.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ×öºÃ×¼±¸,²»Òª¼¤¶¯Å¶!.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1524 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 30 PID 2672 wrote to memory of 1524 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 30 PID 2672 wrote to memory of 1524 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 30 PID 2672 wrote to memory of 1524 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 30 PID 2672 wrote to memory of 1764 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 31 PID 2672 wrote to memory of 1764 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 31 PID 2672 wrote to memory of 1764 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 31 PID 2672 wrote to memory of 1764 2672 d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe 31 PID 1764 wrote to memory of 3060 1764 2.exe 32 PID 1764 wrote to memory of 3060 1764 2.exe 32 PID 1764 wrote to memory of 3060 1764 2.exe 32 PID 1764 wrote to memory of 3060 1764 2.exe 32 PID 1764 wrote to memory of 3060 1764 2.exe 32 PID 1764 wrote to memory of 3060 1764 2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4c78b07615060668383f748381d1c9c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\×öºÃ×¼±¸,²»Òª¼¤¶¯Å¶!.EXE"C:\Users\Admin\AppData\Local\Temp\×öºÃ×¼±¸,²»Òª¼¤¶¯Å¶!.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\system32\mstsc.exe"3⤵PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
895KB
MD538ca55c7c695e14bc80cfa46c80d64b3
SHA186d38ad2070e5f1eefa040a2a3aabc21eb2e5a14
SHA2561b889e649c17ab62571ca14a436878772367b8554dcc4dfd86c2734dffa2e463
SHA512c373306112142529f9830da4fe9ac4a3659e708425f8ed94eac86fc86598ab5f5676da1909afb864bc34bb42af511928989c4d9f4eb3d28e0b6b40e0eaf66245
-
Filesize
801KB
MD5dae0176dc89cdd014677dd638ca72f17
SHA1a8679b4ea6e1e1a86d6db0dbd4f877e61c5a893f
SHA256c3185cc26393102a95c26fd309c72bf3b24416e0a4828507b1ed2fb245f93686
SHA512fd47aa0b5ff9a873d06c662c23948edfb8016761dce3ad5cc2fc7e83ff0a72666e8e5560c33ff345ccec69d9c29f0ca899fc2be55cc6888eaf9019a2c9c4a2d4