Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe
-
Size
85KB
-
MD5
e49c6000102b0ac46d175ffa026cc790
-
SHA1
38a6ee53afa2744b78ad8d3331bbb6e597954547
-
SHA256
fd8c7023c782ef9543a59a9562d2c5c0afc88e02421a9f5a758fd6449a4c28dd
-
SHA512
a0110ff2d4d1adecc7353e2d0c22446399762c3f76468f80958c78acbab0f2e31047a8156f7c0d03748a0b41897a3338b915d21ca782891d4d088d2cb8f9f2c9
-
SSDEEP
1536:sqqu7R0GQ5d4ZytlyH/Kp9k7b4IVB0BByJtXZMa2cNfo4KoOI:f0d4EOivoZruByJtXOa2gr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2544-18-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 behavioral1/files/0x0008000000016858-19.dat modiloader_stage2 behavioral1/memory/2544-34-0x0000000000400000-0x000000000042A000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2544 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 2404 csol.exe -
Loads dropped DLL 9 IoCs
pid Process 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 2544 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe 264 WerFault.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 264 2404 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csol.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2544 ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2544 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2544 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2544 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2544 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2404 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2404 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2404 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2404 2380 e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe 31 PID 2404 wrote to memory of 264 2404 csol.exe 32 PID 2404 wrote to memory of 264 2404 csol.exe 32 PID 2404 wrote to memory of 264 2404 csol.exe 32 PID 2404 wrote to memory of 264 2404 csol.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e49c6000102b0ac46d175ffa026cc790_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ¼¯ÆøС¹¤¾ß.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\csol.exe"C:\Users\Admin\AppData\Local\Temp\csol.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 363⤵
- Loads dropped DLL
- Program crash
PID:264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD59de9a9c8f0d23036322a52ae48f7dd9a
SHA168e09169b60ef65b2742900f716f5d2941d827ce
SHA2569ddf0e209197699fe001cad217d0da14fa629b2c196d30bdb91cbf808ceabd1d
SHA5127735dc24003cff4102c182063ef4e4c7ab8afffa9eebb06af55b1503e533cf7b1a01e63e19963ae6f9084d6927a4d0ed84f0bb5d6d71a1b43010d37ba18fadd2
-
Filesize
20KB
MD530f4acd300eabc29d24bef6b532216a6
SHA193f42f54949eb2dc6870f4edea86144d45e9ad78
SHA256d230e71da3e6231ee2f050d501f466353790882a6c4338e93b839ac0e4a4cfa0
SHA512d5456bae3911a5d9dbc8c56f196d72284c340fe41013c480fe24ba6eb06ffc0745367499bb1d2aa18eb880176ce411b0e39c2b5f35928d48176a830bbf18e140
-
Filesize
29KB
MD5a5014d677eebb5511fe416ceaee1cf91
SHA162344e63ec8a147920537152bf2c180e0001ccf6
SHA2562e71096b2518792c626c8e3771b9e0d642064901dc170a6b5ece717c2ac92892
SHA512d6b04e5fe95250e5286f5f5b5cc6a90aaa1ec46a26d5a92fdf9b1b505b14293b815ad1e24295a315afff063d2ed0d9e6c17e3808eca90f6d363e295ad1e0170a