Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 15:59
Behavioral task
behavioral1
Sample
e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe
-
Size
124KB
-
MD5
e086ed8a858266773d6197e1c703abbe
-
SHA1
840c8e61a85d4973e2125d49de18038302c3b8db
-
SHA256
85112644680f17d463d585e03196d4c691146d14ea561650680d91fef2f708dc
-
SHA512
2ef900fc94260d8f92e1377110f21955e1d658235b64f3d4c08c0e430bbf52c2eb9afc913ebd5919e3f4921f0e6d3b9215722fc113e17d9b7d18f3f663b2522c
-
SSDEEP
1536:fayvRUVU3aH/gcTnwuwCaTVLnp/wyo6ijxgUz3hMDwkdqxAAlktq5zm90YB1:SeCeGPMLndtijxJznkdqxAAlR5S90
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "userinit.exe,C:\\Windows\\apocalyps32.exe" apocalyps32.exe -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2432-283-0x0000000040010000-0x000000004004B000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2272 apocalyps32.exe 2432 apocalyps32.exe -
resource yara_rule behavioral1/memory/1748-0-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/files/0x0009000000012117-5.dat upx behavioral1/memory/2272-9-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/1748-8-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/2272-11-0x0000000040010000-0x000000004004B000-memory.dmp upx behavioral1/memory/2272-83-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/2432-124-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/2272-267-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/2432-268-0x0000000040010000-0x000000004004B000-memory.dmp upx behavioral1/memory/2432-283-0x0000000040010000-0x000000004004B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\apocalyps32 = "C:\\Windows\\apocalyps32.exe" apocalyps32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe File opened for modification C:\Windows\apocalyps32.exe e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe File opened for modification C:\Windows\ap0calypse_C7A67EF0\ServerLogs\Admin\14-09-2024 apocalyps32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 apocalyps32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2272 1748 e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe 28 PID 1748 wrote to memory of 2272 1748 e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe 28 PID 1748 wrote to memory of 2272 1748 e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe 28 PID 1748 wrote to memory of 2272 1748 e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe 28 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29 PID 2272 wrote to memory of 2432 2272 apocalyps32.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e086ed8a858266773d6197e1c703abbe_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\apocalyps32.exe-bs3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\apocalyps32.exe"C:\Windows\apocalyps32.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5e086ed8a858266773d6197e1c703abbe
SHA1840c8e61a85d4973e2125d49de18038302c3b8db
SHA25685112644680f17d463d585e03196d4c691146d14ea561650680d91fef2f708dc
SHA5122ef900fc94260d8f92e1377110f21955e1d658235b64f3d4c08c0e430bbf52c2eb9afc913ebd5919e3f4921f0e6d3b9215722fc113e17d9b7d18f3f663b2522c