Analysis
-
max time kernel
91s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 18:07
Behavioral task
behavioral1
Sample
e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe
-
Size
294KB
-
MD5
e769fe5993c5e3a28432319d9e28cc45
-
SHA1
e6f2cb7d71596ee39a45cb1c2d2e87220795db2f
-
SHA256
abecee861e0311642dbcd28e48d10ff6673ad999f060db3d50a44f3c2558c730
-
SHA512
e0f7c3d257900d518ece398e6e1577298d15c399e45e3433630853f42bbc86f844869fd6cf59501dca50aff8b5689a797db2d9b9c907418021cf08ae0e98ab9a
-
SSDEEP
6144:i4hJQM/KsXoMDGWmV9Jw9DY7yQue0VkIdrbsbo/V3cYC9hUdkv4cwze7ebL0:iQJQIldSNqlYCeq/rYE/VMYC9hakxd1
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2636-40-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2672-39-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 winre.exe -
Loads dropped DLL 2 IoCs
pid Process 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2636-0-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/files/0x0001000000000027-10.dat upx behavioral1/memory/2672-20-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2636-40-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2672-39-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2828-29-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\G: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\M: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\N: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\R: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\X: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\E: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\H: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\J: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\K: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\O: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\Z: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\I: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\Q: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\S: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\U: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\V: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\A: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\L: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\P: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\T: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\W: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened (read-only) \??\Y: e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened for modification C:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File created F:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened for modification F:\AutoRun.inf e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_winre.exe winre.exe File opened for modification C:\Windows\SysWOW64\_winre.exe winre.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2828 2672 winre.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winre.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2672 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2672 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2672 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2672 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2828 2672 winre.exe 31 PID 2672 wrote to memory of 2828 2672 winre.exe 31 PID 2672 wrote to memory of 2828 2672 winre.exe 31 PID 2672 wrote to memory of 2828 2672 winre.exe 31 PID 2672 wrote to memory of 2828 2672 winre.exe 31 PID 2672 wrote to memory of 2828 2672 winre.exe 31 PID 2672 wrote to memory of 2556 2672 winre.exe 32 PID 2672 wrote to memory of 2556 2672 winre.exe 32 PID 2672 wrote to memory of 2556 2672 winre.exe 32 PID 2672 wrote to memory of 2556 2672 winre.exe 32 PID 2636 wrote to memory of 2824 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 33 PID 2636 wrote to memory of 2824 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 33 PID 2636 wrote to memory of 2824 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 33 PID 2636 wrote to memory of 2824 2636 e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e769fe5993c5e3a28432319d9e28cc45_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\winre.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2828
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD54fc3b31ec84659dbea59fae0190b93a7
SHA156766597937b58fba6dde077f896cbd90359e700
SHA2563c87c98d6a396659ec87dda6b49ca07e57b935cdb1b588db5acf9e24550192fe
SHA51205ad27fa4d71706d75c08fbfd1c64656415d0c92c48ea04512fc0e74d6fc3c03a6271b112dd27959f42369ecebeb68ee849f82a5bf65b3d849e5e14f9b864d34
-
Filesize
294KB
MD5e769fe5993c5e3a28432319d9e28cc45
SHA1e6f2cb7d71596ee39a45cb1c2d2e87220795db2f
SHA256abecee861e0311642dbcd28e48d10ff6673ad999f060db3d50a44f3c2558c730
SHA512e0f7c3d257900d518ece398e6e1577298d15c399e45e3433630853f42bbc86f844869fd6cf59501dca50aff8b5689a797db2d9b9c907418021cf08ae0e98ab9a