Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe
-
Size
683KB
-
MD5
e1317ffb51838ea28a663b8608a94272
-
SHA1
ae0b2f7872e42dca0928e95a4156c32bbe750b86
-
SHA256
d3c4349112f3269e9fcb146ad34ec498c141eede2f8630ee05fb76c9c8f020fb
-
SHA512
fc0787179a569d4e80c5485bc3038dd5c906205ec2703c81f1a2f4db0226e3c4f7016386d7e4214534d5419384d95afc9698c684e0fa7b0874bda183a34328fa
-
SSDEEP
12288:MVnlC+/F7TegtMt0ReMKpqysHhhvOBoLF3Z4mxxHI80Uzl6wXMJMAEGH/cQ6ed/o:w1/F7TPtJe3sHhROBoLQmXo856cMdEiY
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/files/0x0009000000015d41-61.dat modiloader_stage2 behavioral1/memory/2776-68-0x0000000000400000-0x00000000004C4200-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2776 4.exe -
Loads dropped DLL 5 IoCs
pid Process 1704 e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe 1704 e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\FieleWay.txt 4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2936 2776 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2776 1704 e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe 30 PID 1704 wrote to memory of 2776 1704 e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe 30 PID 1704 wrote to memory of 2776 1704 e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe 30 PID 1704 wrote to memory of 2776 1704 e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2936 2776 4.exe 31 PID 2776 wrote to memory of 2936 2776 4.exe 31 PID 2776 wrote to memory of 2936 2776 4.exe 31 PID 2776 wrote to memory of 2936 2776 4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1317ffb51838ea28a663b8608a94272_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2843⤵
- Loads dropped DLL
- Program crash
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
749KB
MD5ef2f1cd1713649b713cb569cdb5e317d
SHA136714e103fad719c32fab24f84ca6dede71ca011
SHA2564ab1c540d788f30cf980dfa77e30d0bf46e0aefcf690da0fd1959947dd417056
SHA512f5e776100209ef716af68218ec25fd5e339effd3b3b45acb87a9da3cdb54776d8ae634701e169f0542b60877137e18173a0cfa58f0923d21adf4669154d85701