Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe
-
Size
439KB
-
MD5
e43233e286a5840b42e9b425ab29bb94
-
SHA1
b64ccfcd43e235c06e9902b7d5e41749102b05c5
-
SHA256
dc5a6bf841fc414b0fe31145072fb778c8055df2e814802bbd51c6bec22423ed
-
SHA512
3756a3942fcca54941ce27efa387abf8bd261316690fae64a36ec063cf27460eb997ace2af1c4424a8352de1b9ffebca6ab2418448ee4b2b8c2a94f30dc24718
-
SSDEEP
12288:e1zp8HFpd9vkYoMybSj+AfrXhWQPNFNYR/rstf4:epSlFTESprPVDistf4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2092-7-0x0000000000400000-0x00000000005FC000-memory.dmp modiloader_stage2 behavioral1/memory/1912-28-0x0000000000400000-0x00000000005FC000-memory.dmp modiloader_stage2 behavioral1/memory/2092-30-0x0000000000400000-0x00000000005FC000-memory.dmp modiloader_stage2 behavioral1/memory/1912-21-0x0000000000400000-0x00000000005FC000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2104 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 wins.exe -
Loads dropped DLL 2 IoCs
pid Process 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins.exe e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wins.exe e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wins.exe wins.exe File created C:\Windows\SysWOW64\SgotoDel.bat e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wins.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1912 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 30 PID 2092 wrote to memory of 1912 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 30 PID 2092 wrote to memory of 1912 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 30 PID 2092 wrote to memory of 1912 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2104 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2104 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2104 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 31 PID 2092 wrote to memory of 2104 2092 e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e43233e286a5840b42e9b425ab29bb94_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\wins.exeC:\Windows\system32\wins.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1912
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\SgotoDel.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5e33480990ee4b104284ff194aa996eb2
SHA1bfbcc8ff66a70ee7ede32de54e21b8333ab7c417
SHA256a3188be43649ff94c5414e212b1679ce3486aea9d01eb66f284c86e23c745b73
SHA5125e454704b401ada3bf06f74db400db90aa517ed46648f5b56cdbe61fb8e04a70fe73da5212e12757ca7d16690333c7352b9ea8dfffcf2de9d0998d915c9415a0
-
Filesize
439KB
MD5e43233e286a5840b42e9b425ab29bb94
SHA1b64ccfcd43e235c06e9902b7d5e41749102b05c5
SHA256dc5a6bf841fc414b0fe31145072fb778c8055df2e814802bbd51c6bec22423ed
SHA5123756a3942fcca54941ce27efa387abf8bd261316690fae64a36ec063cf27460eb997ace2af1c4424a8352de1b9ffebca6ab2418448ee4b2b8c2a94f30dc24718