Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 23:04
Behavioral task
behavioral1
Sample
d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe
-
Size
269KB
-
MD5
d92c2e7953f27f7612ef252cadf2c99b
-
SHA1
8822d7d4c4ed35a454cafcf2e59c271b972cd9d1
-
SHA256
23a2ab53d60965bdc69e42500f1ee827b54d8d6cf5a27a7f5f2cc9d9d3597065
-
SHA512
f2bac8ee196cd450733863f19aa19f2d488c264076a6164b3bf5c0b45295fcbbd2043035ea495dd4f322c9c366f0afd81f647d6964a408223532c3f6553f4782
-
SSDEEP
6144:/Zw+OAXJolC4ab+4ybMjp4HfaXDmMDKDDS5r4B+0bkw2mh:/iAX+faa9bByXDmi3xTvY
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/904-9-0x0000000000400000-0x0000000000444000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2356 mr-torat2.exe 2724 mr-torat2.exe -
Loads dropped DLL 3 IoCs
pid Process 904 d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe 904 d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe 2356 mr-torat2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 2724 2356 mr-torat2.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mr-torat2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2724 mr-torat2.exe 2724 mr-torat2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2356 mr-torat2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 904 wrote to memory of 2356 904 d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe 29 PID 904 wrote to memory of 2356 904 d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe 29 PID 904 wrote to memory of 2356 904 d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe 29 PID 904 wrote to memory of 2356 904 d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe 29 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2356 wrote to memory of 2724 2356 mr-torat2.exe 30 PID 2724 wrote to memory of 1200 2724 mr-torat2.exe 20 PID 2724 wrote to memory of 1200 2724 mr-torat2.exe 20 PID 2724 wrote to memory of 1200 2724 mr-torat2.exe 20 PID 2724 wrote to memory of 1200 2724 mr-torat2.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d92c2e7953f27f7612ef252cadf2c99b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\mr-torat2.exe"C:\Users\Admin\AppData\Local\Temp\mr-torat2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\mr-torat2.exeC:\Users\Admin\AppData\Local\Temp\mr-torat2.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5084fd5b69ba29008c9f0df0b5ab7b029
SHA13dfa53e3f20feef9e731e28d3fd325b3fe4b2fc3
SHA2564c9bead2fa1d0c5967efb7d9f4266810c6eb8c58a83ce703435c3ec16c879c2c
SHA51224145b4656cbe97056071a6c9a70fed3a41faf0112cd681ad209bc98865fe8bc79619f64a90c8f98a4804c8b6840f39107f4ea9300944090c5f53c018aaa0ebf