Analysis
-
max time kernel
109s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe
-
Size
592KB
-
MD5
d96e004606404970c75d5c4fa5c345fb
-
SHA1
d009f9b906817858e16ae88a30e901dfecdcc913
-
SHA256
3c921aa8a9a95ba021655adfb04749f649fdce9c72d1f48384708aa4a39f2d97
-
SHA512
a40bce43f6505f918553148f09a09066cff0c93c5b8f27898e8056dcdf62dd4572f5989a9afb769326e4b06e0e08cb4ba9744b843219c0b90d2a930e319f3feb
-
SSDEEP
12288:+h7061tI6NHzhzxmzNgRn6+hy9UF3Z4mxxVDqVTVOCs:+1061ttNHzvmzNU6+hyWQmXkVTzs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/3856-77-0x0000000000400000-0x000000000055D000-memory.dmp modiloader_stage2 behavioral2/memory/3200-80-0x0000000000400000-0x000000000055D000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3200 huyulai.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\A: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\I: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\M: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\P: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\U: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\T: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\V: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\X: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\B: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\H: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\K: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\L: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\R: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\J: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\O: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\Y: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\Z: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\E: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\G: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\N: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\Q: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened (read-only) \??\S: d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened for modification C:\AutoRun.inf d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File created F:\AutoRun.inf d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened for modification F:\AutoRun.inf d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\huyulai.exe d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\huyulai.exe d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe File created C:\Program Files\_huyulai.exe huyulai.exe File opened for modification C:\Program Files\_huyulai.exe huyulai.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SxingDel.bat d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3472 3200 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language huyulai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3856 wrote to memory of 3200 3856 d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe 88 PID 3856 wrote to memory of 3200 3856 d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe 88 PID 3856 wrote to memory of 3200 3856 d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe 88 PID 3200 wrote to memory of 3116 3200 huyulai.exe 89 PID 3200 wrote to memory of 3116 3200 huyulai.exe 89 PID 3856 wrote to memory of 1136 3856 d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe 93 PID 3856 wrote to memory of 1136 3856 d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe 93 PID 3856 wrote to memory of 1136 3856 d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d96e004606404970c75d5c4fa5c345fb_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\huyulai.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\huyulai.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"3⤵PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 6843⤵
- Program crash
PID:3472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SxingDel.bat""2⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3200 -ip 32001⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD587af96347a7dcdac0e118c33e49d43a0
SHA12d9c16a19a5b93bf7bb06db4ebd3db169ee1ece3
SHA2566f13b526add73ac4cf484678d05b56c1451bc29f5ae18a02847ad6041691837c
SHA512f2b11eed499727b34f92674d457580831a5a482095c44b4b1f4f09f9b5c733e6679a97076a05c4c41cea16e70660f16fe53daabaa712c8949d8ea2416bf75c4a
-
Filesize
592KB
MD5d96e004606404970c75d5c4fa5c345fb
SHA1d009f9b906817858e16ae88a30e901dfecdcc913
SHA2563c921aa8a9a95ba021655adfb04749f649fdce9c72d1f48384708aa4a39f2d97
SHA512a40bce43f6505f918553148f09a09066cff0c93c5b8f27898e8056dcdf62dd4572f5989a9afb769326e4b06e0e08cb4ba9744b843219c0b90d2a930e319f3feb