Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe
-
Size
702KB
-
MD5
e84f2033721a0fbf93623a8fb4b4f062
-
SHA1
ee2e2eb31e01fef68bb1d63d6de7e6189a7d0991
-
SHA256
4bcf32823fb089417367f29c8191ffb847314ddec4fd57be1d2820e979cb9bb3
-
SHA512
9cd5e2d923263aa7591d3ae2c5403196f5d30ff8abb278e256be8cde05d718fce7e275c5ed18e387b7064e3a36655e6582d55cff97b6973669ef4b1efe983462
-
SSDEEP
12288:R9MfAPMr3eAEWzmC3bteS+kzccf/UsckmCReEa0CAu4vOIiBej6QPFMP:eOw5eYzcYUswmee7uOjVPFMP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2496-47-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral1/memory/2496-67-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral1/memory/2016-71-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral1/memory/2496-80-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1844 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 rejoice47.exe -
Loads dropped DLL 2 IoCs
pid Process 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2016 set thread context of 2864 2016 rejoice47.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2776 2016 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2016 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 30 PID 2496 wrote to memory of 2016 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 30 PID 2496 wrote to memory of 2016 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 30 PID 2496 wrote to memory of 2016 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 30 PID 2016 wrote to memory of 2864 2016 rejoice47.exe 31 PID 2016 wrote to memory of 2864 2016 rejoice47.exe 31 PID 2016 wrote to memory of 2864 2016 rejoice47.exe 31 PID 2016 wrote to memory of 2864 2016 rejoice47.exe 31 PID 2016 wrote to memory of 2864 2016 rejoice47.exe 31 PID 2016 wrote to memory of 2864 2016 rejoice47.exe 31 PID 2016 wrote to memory of 2940 2016 rejoice47.exe 32 PID 2016 wrote to memory of 2940 2016 rejoice47.exe 32 PID 2016 wrote to memory of 2940 2016 rejoice47.exe 32 PID 2016 wrote to memory of 2940 2016 rejoice47.exe 32 PID 2016 wrote to memory of 2776 2016 rejoice47.exe 33 PID 2016 wrote to memory of 2776 2016 rejoice47.exe 33 PID 2016 wrote to memory of 2776 2016 rejoice47.exe 33 PID 2016 wrote to memory of 2776 2016 rejoice47.exe 33 PID 2496 wrote to memory of 1844 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1844 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1844 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1844 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1844 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1844 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 35 PID 2496 wrote to memory of 1844 2496 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2864
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 3123⤵
- Program crash
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5b36b79e3e79b9474a6aed2effab3af45
SHA142151def24702d15c9c9ba44075e55e6ee491ab6
SHA2565c17829dda4506f552c6ad96982169a41e6506722ddf31d2476e55ab130b3eb7
SHA512820a9f9c8763148f7a49ad048839d560a1f8656d8f2013a8a21cd22d6d242ec65e715031ad119b377c27dc32ba5e751e649b8b0e3dd6a383c2c93cbbb733b503
-
Filesize
702KB
MD5e84f2033721a0fbf93623a8fb4b4f062
SHA1ee2e2eb31e01fef68bb1d63d6de7e6189a7d0991
SHA2564bcf32823fb089417367f29c8191ffb847314ddec4fd57be1d2820e979cb9bb3
SHA5129cd5e2d923263aa7591d3ae2c5403196f5d30ff8abb278e256be8cde05d718fce7e275c5ed18e387b7064e3a36655e6582d55cff97b6973669ef4b1efe983462