Analysis
-
max time kernel
96s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 22:00
Behavioral task
behavioral1
Sample
e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe
-
Size
786KB
-
MD5
e11f797fa001457a8de0b985b8efd17e
-
SHA1
69e9c3e1e7b3c260dc300dcd452ecf26ee1aeef0
-
SHA256
111fe6977249740d31b9af738c485b007ad050f6fc450f54b8e4df60789894ad
-
SHA512
fce1cb7ddd88a140786043c4acf1795cf910d28046c2485bf6c5e4e8f7c2fc6514c68de31db4b88ac2ea1b7b43a3a414584f2a9fdd9af2d816656ba87a23c45e
-
SSDEEP
12288:AlZYc2z1y6lc5AgHQPQjd+d6v75Ce6BODa4ATsuPycl4O8yDl4lmTwA:AlKcI1uYPQjd+s755C3zDxl4lmTB
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/memory/1612-0-0x0000000000400000-0x00000000004C7000-memory.dmp modiloader_stage2 behavioral2/files/0x000100000000002b-10.dat modiloader_stage2 behavioral2/memory/1784-18-0x0000000000400000-0x00000000004C7000-memory.dmp modiloader_stage2 behavioral2/memory/1612-23-0x0000000000400000-0x00000000004C7000-memory.dmp modiloader_stage2 behavioral2/memory/3028-22-0x0000000000400000-0x00000000004C7000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3028 rejoice91.exe -
resource yara_rule behavioral2/memory/1612-0-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/files/0x000100000000002b-10.dat upx behavioral2/memory/1784-18-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/1612-23-0x0000000000400000-0x00000000004C7000-memory.dmp upx behavioral2/memory/3028-22-0x0000000000400000-0x00000000004C7000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\Y: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\I: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\K: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\P: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\R: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\S: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\B: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\E: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\G: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\J: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\L: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\O: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\V: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\X: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\A: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\H: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\M: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\Q: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\T: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\U: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\W: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened (read-only) \??\Z: e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File created F:\AutoRun.inf e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened for modification F:\AutoRun.inf e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File created C:\AutoRun.inf e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice91.exe rejoice91.exe File opened for modification C:\Windows\SysWOW64\_rejoice91.exe rejoice91.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 1784 3028 rejoice91.exe 87 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice91.exe e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice91.exe e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3064 1784 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3028 1612 e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe 86 PID 1612 wrote to memory of 3028 1612 e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe 86 PID 1612 wrote to memory of 3028 1612 e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe 86 PID 3028 wrote to memory of 1784 3028 rejoice91.exe 87 PID 3028 wrote to memory of 1784 3028 rejoice91.exe 87 PID 3028 wrote to memory of 1784 3028 rejoice91.exe 87 PID 3028 wrote to memory of 1784 3028 rejoice91.exe 87 PID 3028 wrote to memory of 1784 3028 rejoice91.exe 87 PID 3028 wrote to memory of 2012 3028 rejoice91.exe 89 PID 3028 wrote to memory of 2012 3028 rejoice91.exe 89 PID 1612 wrote to memory of 1428 1612 e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe 90 PID 1612 wrote to memory of 1428 1612 e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe 90 PID 1612 wrote to memory of 1428 1612 e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e11f797fa001457a8de0b985b8efd17e_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice91.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice91.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 124⤵
- Program crash
PID:3064
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""2⤵
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1784 -ip 17841⤵PID:3896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD54fcceed71663bb45154c631e73757c53
SHA1e5ae60d8296195c81a65ec412a0cd81637305901
SHA256053b416993af3f05dadb45a0d249eba5d411d180af44071772713db79d61fd2c
SHA5128ca8989c19106ce13f6865d8e518ed7a703608e0e43acd76f16eccb97c8befcb9ef03575b06fa7c8eaceb256882b9aa79983d4baad4ed3d9f4e7c282d753197f
-
Filesize
786KB
MD5e11f797fa001457a8de0b985b8efd17e
SHA169e9c3e1e7b3c260dc300dcd452ecf26ee1aeef0
SHA256111fe6977249740d31b9af738c485b007ad050f6fc450f54b8e4df60789894ad
SHA512fce1cb7ddd88a140786043c4acf1795cf910d28046c2485bf6c5e4e8f7c2fc6514c68de31db4b88ac2ea1b7b43a3a414584f2a9fdd9af2d816656ba87a23c45e