Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/09/2024, 16:08
Behavioral task
behavioral1
Sample
d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe
-
Size
766KB
-
MD5
d88e602afd209478cb4014d2eaf3aca7
-
SHA1
69834f5d0f3f8dd8c944ae1ca016d1d284d4748f
-
SHA256
cddbbc4f65ebd1790d40f6b451ffa1783e521af3886db5053ae994a83bcb50c5
-
SHA512
cd2d810416bd2be223bd142db48ce02c7cd0ee5f7eb8d97ff2174736995448403c40710ea5caf1ae589f3322faa94f8cf1c994e7e5d36be308b8be691751ca58
-
SSDEEP
12288:HV5EEDkzhc5S1HwFa4dhq0B/71n3EbdtlrA8O/XThdfK:15JId1HwsH0JFWXfOXTa
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/files/0x00070000000120fe-3.dat modiloader_stage2 behavioral1/memory/1788-18-0x0000000000400000-0x00000000004C8000-memory.dmp modiloader_stage2 behavioral1/memory/2536-23-0x0000000000400000-0x00000000004C8000-memory.dmp modiloader_stage2 behavioral1/memory/2108-24-0x0000000000400000-0x00000000004C8000-memory.dmp modiloader_stage2 behavioral1/memory/2536-36-0x0000000000400000-0x00000000004C8000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2108 rejoice38.exe -
Loads dropped DLL 5 IoCs
pid Process 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 1680 WerFault.exe 1680 WerFault.exe 1680 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice38.exe rejoice38.exe File opened for modification C:\Windows\SysWOW64\_rejoice38.exe rejoice38.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2108 set thread context of 1788 2108 rejoice38.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1680 2108 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2108 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2108 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2108 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2108 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 30 PID 2108 wrote to memory of 1788 2108 rejoice38.exe 31 PID 2108 wrote to memory of 1788 2108 rejoice38.exe 31 PID 2108 wrote to memory of 1788 2108 rejoice38.exe 31 PID 2108 wrote to memory of 1788 2108 rejoice38.exe 31 PID 2108 wrote to memory of 1788 2108 rejoice38.exe 31 PID 2108 wrote to memory of 1788 2108 rejoice38.exe 31 PID 2108 wrote to memory of 1680 2108 rejoice38.exe 32 PID 2108 wrote to memory of 1680 2108 rejoice38.exe 32 PID 2108 wrote to memory of 1680 2108 rejoice38.exe 32 PID 2108 wrote to memory of 1680 2108 rejoice38.exe 32 PID 2536 wrote to memory of 2652 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 34 PID 2536 wrote to memory of 2652 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 34 PID 2536 wrote to memory of 2652 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 34 PID 2536 wrote to memory of 2652 2536 d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d88e602afd209478cb4014d2eaf3aca7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice38.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD579d3e9601b5e915d60c6b279c7a904d9
SHA11cba67e092ffae396fbb66a616bf25c812ae1088
SHA256dfdd9ebb724ca96d4c916e267b36bfb059a138923241acbdb7782df79228da50
SHA512536af758940af3becc554d112c591f150b0e88ef125beb5b02bbd0e9d41616e7f9edf7d85c5789b8aec0b1698d244d705a345ea550451f1959a11d1ce744f37b
-
Filesize
766KB
MD5d88e602afd209478cb4014d2eaf3aca7
SHA169834f5d0f3f8dd8c944ae1ca016d1d284d4748f
SHA256cddbbc4f65ebd1790d40f6b451ffa1783e521af3886db5053ae994a83bcb50c5
SHA512cd2d810416bd2be223bd142db48ce02c7cd0ee5f7eb8d97ff2174736995448403c40710ea5caf1ae589f3322faa94f8cf1c994e7e5d36be308b8be691751ca58