Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe
-
Size
63KB
-
MD5
e72e7584c01eb61b140b8ce1f6d23852
-
SHA1
2443ffd78526e6d891cbd8b4b7e44c18b77314ee
-
SHA256
eb9652c346b0d96398937befba28c0c32f4dcad39ce1fad0b94293e4df6d7c2c
-
SHA512
343aa4f01554ea4ef1b6c25ed1b73f81b0997647334e2c0eac553f55395d746cddff656837d4b4baf8701b5635a79a98c44c04eeb0e0fc5852d463dc1e834e4d
-
SSDEEP
1536:om7wjsVTJ+p3JrkGLawHE/E2j+E0Rm8D1hRoZm3IyAq/b:T+sVT45mn/bjn0Rm8DTRoZmFAq/b
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/4824-2-0x0000000000400000-0x0000000000422034-memory.dmp modiloader_stage2 behavioral2/files/0x0009000000023461-4.dat modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 4576 temp.exe 4848 tcpip.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\tcpip.exe temp.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe temp.exe File created C:\Windows\SysWOW64\kjkjkjkjk.bat temp.exe File created C:\Windows\SysWOW64\wwinsystem.dll tcpip.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4824 e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe 4824 e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe 4824 e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe 4824 e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4848 tcpip.exe 4848 tcpip.exe 4848 tcpip.exe 4848 tcpip.exe 4848 tcpip.exe 4848 tcpip.exe 4848 tcpip.exe 4848 tcpip.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4576 temp.exe 4848 tcpip.exe 4848 tcpip.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4576 temp.exe Token: SeDebugPrivilege 4848 tcpip.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3916 4824 e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe 82 PID 4824 wrote to memory of 3916 4824 e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe 82 PID 4824 wrote to memory of 3916 4824 e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe 82 PID 3916 wrote to memory of 4576 3916 cmd.exe 84 PID 3916 wrote to memory of 4576 3916 cmd.exe 84 PID 3916 wrote to memory of 4576 3916 cmd.exe 84 PID 4576 wrote to memory of 4044 4576 temp.exe 86 PID 4576 wrote to memory of 4044 4576 temp.exe 86 PID 4576 wrote to memory of 4044 4576 temp.exe 86 PID 4848 wrote to memory of 3536 4848 tcpip.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e72e7584c01eb61b140b8ce1f6d23852_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\temp.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\temp.exeC:\Users\Admin\AppData\Local\Temp\temp.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\kjkjkjkjk.bat5⤵
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
-
-
C:\Windows\SysWOW64\tcpip.exeC:\Windows\SysWOW64\tcpip.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD53e9d04d6eab489d6c744bd666085609a
SHA1d42a12d46290e9046ba572ad351efe43866213a7
SHA256d8e2f5e8e92094bd7179ea806ba07f2a1d02b5fc836b9d52d72b94968845b107
SHA5128934458e5be82123c7a13be32573a8d87e7fb632f54ae5dd156812caec1153c488d7f2af8789dcd50b80ae1330963548e9600544958f0124865aeeefb209eb6c
-
Filesize
138B
MD58c03f6d2924da0d37259dbb8c65a90f8
SHA13073f1a6f5cd9397eb4c7ee744e083d50c95d0c5
SHA25690f4c857ec12179ba414ce791a9736fb70b4e1782405743101ee9b0f133cd932
SHA5127809b96b9955099551a0c0ca36bae05b5642323b532cd5e7f561beb94827b11220d4c3424c09733b659c3555c3a6c99737bd36344e89e6128d5c21a833c547e3