Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe
-
Size
21KB
-
MD5
e6e79c5eec97d72ccecf056d86edda31
-
SHA1
594b3f472d17332d29f65c399a2aee3d53e287ad
-
SHA256
1a18a3b8a392dc4022f96c20bec58dc5f2d1443fb71248811783f6da8d25853e
-
SHA512
079ac81161bfd4faadadd44c118186f1907bcc0cc647849b6b8f63fc7ccbae1ba693c2db7348e31a27c14dd157abe5258fc2614367d6f7d3a06792819fb01340
-
SSDEEP
384:IK3dFCD29HoKi5bNsvfd8qvlRjDTy/PMpTu1uz9sKnCqQ6MNeY1ff:IYPCD6Xi5xsnd8KjPy/PaGKnMKaf
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1712-18-0x0000000000400000-0x0000000000423000-memory.dmp modiloader_stage2 behavioral1/memory/1796-20-0x0000000000400000-0x0000000000423000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1796 sourro.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\sourro.exe e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe File opened for modification C:\Windows\sourro.exe e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe File created C:\Windows\qiji.dll sourro.exe File created C:\Windows\sourro.exe sourro.exe File created C:\Windows\mm e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe File created C:\Windows\qiji.dll e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sourro.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe Token: SeRestorePrivilege 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe Token: SeBackupPrivilege 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe Token: SeRestorePrivilege 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1796 sourro.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1796 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe 30 PID 1712 wrote to memory of 1796 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe 30 PID 1712 wrote to memory of 1796 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe 30 PID 1712 wrote to memory of 1796 1712 e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e6e79c5eec97d72ccecf056d86edda31_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\sourro.exeC:\Windows\sourro.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5b25540018630a9acc79842a14b0884c4
SHA1aaf2dcaa2f6b0fac56a63880f58a6dccecf6c74e
SHA25622e9a70ebcedbc03f5e723893feb7a8d6fd70f8692f0d42867fde28b45763989
SHA5125d4bd7f4706f09b565b8856558663bfa9a01fc5fc39e5e4cc663ad47b754e192bff250c9dfec7293b02869e6a29e1674c7eb9c3595354dedb790dde6d3f8c2f8
-
Filesize
21KB
MD5e6e79c5eec97d72ccecf056d86edda31
SHA1594b3f472d17332d29f65c399a2aee3d53e287ad
SHA2561a18a3b8a392dc4022f96c20bec58dc5f2d1443fb71248811783f6da8d25853e
SHA512079ac81161bfd4faadadd44c118186f1907bcc0cc647849b6b8f63fc7ccbae1ba693c2db7348e31a27c14dd157abe5258fc2614367d6f7d3a06792819fb01340