Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe
-
Size
144KB
-
MD5
ea0c4dc00e4d02dc64724179ef8f7fd0
-
SHA1
527b92e6b316b34ee9e1fe70e643fc74ecbb04d5
-
SHA256
810b08134a3a1d41d3875945eefdf1b4956f5b9c45bc105c090cae18a44bd1f3
-
SHA512
a9f7f6aa0669a350959ed36c588c4689d0a28ed5280e495910d77b9f82621da1dd9b6cefd5ab37eca8e9ced027f9acbfa0f3f46114a97c5e4d3454110c4de1d4
-
SSDEEP
3072:b1dlKwgj23+Oz05YoNozDOpXgfRsoOnQbGbgHfmWyw:b1dlZro5yAIRsoOp8eRw
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/files/0x000800000001937b-19.dat modiloader_stage2 behavioral1/memory/2276-33-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2276 final.exe 2856 final.exe 2552 BrainBot.exe -
Loads dropped DLL 8 IoCs
pid Process 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 2276 final.exe 1992 WerFault.exe 1992 WerFault.exe 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 1992 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2276 set thread context of 2856 2276 final.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1992 2856 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language final.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language final.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BrainBot.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\£©C¥ änV¡((WZ$GQª,Z¨X|Xª; ™–V_Ü'_S ]ÓOý´Ü.@ÕEoY!:\ÕDq¡ÝWäTÓ¯qàT›¿WÓ§Ù\rÕ˜Y!E!¨X\Óº!2¥(_Ú×çó 5_2ѱo0[5Z=Pƒ:±lŸ×ÑãWs£‹ ÓªËÿÉZ×à345]@ÿª¬%¥ >aÑé^XU-*ÑsI8]¸UÕݬµ @¬îèºÐ9é ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 BrainBot.exe 2552 BrainBot.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2276 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2276 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2276 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 30 PID 2676 wrote to memory of 2276 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 30 PID 2276 wrote to memory of 2856 2276 final.exe 31 PID 2276 wrote to memory of 2856 2276 final.exe 31 PID 2276 wrote to memory of 2856 2276 final.exe 31 PID 2276 wrote to memory of 2856 2276 final.exe 31 PID 2276 wrote to memory of 2856 2276 final.exe 31 PID 2276 wrote to memory of 2856 2276 final.exe 31 PID 2856 wrote to memory of 1992 2856 final.exe 32 PID 2856 wrote to memory of 1992 2856 final.exe 32 PID 2856 wrote to memory of 1992 2856 final.exe 32 PID 2856 wrote to memory of 1992 2856 final.exe 32 PID 2676 wrote to memory of 2552 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2552 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2552 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 33 PID 2676 wrote to memory of 2552 2676 ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea0c4dc00e4d02dc64724179ef8f7fd0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\final.exe"C:\Users\Admin\AppData\Local\Temp\final.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\final.exeC:\Users\Admin\AppData\Local\Temp\final.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 364⤵
- Loads dropped DLL
- Program crash
PID:1992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BrainBot.exe"C:\Users\Admin\AppData\Local\Temp\BrainBot.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
644KB
MD5da5299cd50932d6cc414f413cbdd543b
SHA1f50ba031e37217ffdb8d6a533dad26fb9235ba06
SHA256298969cee5167e48e323c202d2b8fa7439f67555aa3d53d71b7ecce09e1c2623
SHA512d91b6fe7b5bfdce114dea23c0b1ea7a97316ca39de42a940b873c227431435445dc681585596eed657328e32068752b34246bb9e6f467fb0a026276d36adb78a
-
Filesize
204B
MD5ea5a1e1e3418f169bd4c0abbc9e2aea1
SHA1ef9e2029483f5e2d388578e37bcee91caaa94c9e
SHA256c31ad1a6bccd3d6fd8b3468440df7ff3066b8dec0a40d8d6af2427e3723d8308
SHA512cd4ec2e845885762033910875bdf8726bda45b6bf496bc2222d45a18edfc2976b3c3291f1d9a1a73ad8d83e40491df34e590638dcae6425385e2f4737cae1960
-
Filesize
18KB
MD590a40d88254fcb93545a3b7d6496bdeb
SHA19a14633c30c1d37976b9d9043f042e6d41618c54
SHA256e774da08777b725d352f364255553848ea5cc6b364232c316449d2c10ea098a6
SHA51276a1f853d9a98fc14503a62f8b2a4d951dac2bad17613b88197bd5978b0d645d5be7e02e22cc1a18b63398ade2053ac5a85a34c0bdac868c2b1ee2c5d795864e