Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 04:13
Static task
static1
Behavioral task
behavioral1
Sample
e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe
-
Size
702KB
-
MD5
e84f2033721a0fbf93623a8fb4b4f062
-
SHA1
ee2e2eb31e01fef68bb1d63d6de7e6189a7d0991
-
SHA256
4bcf32823fb089417367f29c8191ffb847314ddec4fd57be1d2820e979cb9bb3
-
SHA512
9cd5e2d923263aa7591d3ae2c5403196f5d30ff8abb278e256be8cde05d718fce7e275c5ed18e387b7064e3a36655e6582d55cff97b6973669ef4b1efe983462
-
SSDEEP
12288:R9MfAPMr3eAEWzmC3bteS+kzccf/UsckmCReEa0CAu4vOIiBej6QPFMP:eOw5eYzcYUswmee7uOjVPFMP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral2/memory/4612-5-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/4612-6-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/4612-10-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/4612-9-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/4612-8-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/4612-7-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/4612-13-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/4612-24-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 behavioral2/memory/3288-27-0x0000000000400000-0x00000000005C2000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3288 rejoice47.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3288 set thread context of 2916 3288 rejoice47.exe 83 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3404 3288 WerFault.exe 82 4284 2916 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3288 4612 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 82 PID 4612 wrote to memory of 3288 4612 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 82 PID 4612 wrote to memory of 3288 4612 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 82 PID 3288 wrote to memory of 2916 3288 rejoice47.exe 83 PID 3288 wrote to memory of 2916 3288 rejoice47.exe 83 PID 3288 wrote to memory of 2916 3288 rejoice47.exe 83 PID 3288 wrote to memory of 2916 3288 rejoice47.exe 83 PID 3288 wrote to memory of 2916 3288 rejoice47.exe 83 PID 3288 wrote to memory of 3956 3288 rejoice47.exe 85 PID 3288 wrote to memory of 3956 3288 rejoice47.exe 85 PID 4612 wrote to memory of 1772 4612 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 90 PID 4612 wrote to memory of 1772 4612 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 90 PID 4612 wrote to memory of 1772 4612 e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e84f2033721a0fbf93623a8fb4b4f062_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 124⤵
- Program crash
PID:4284
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 6643⤵
- Program crash
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3288 -ip 32881⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2916 -ip 29161⤵PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5b36b79e3e79b9474a6aed2effab3af45
SHA142151def24702d15c9c9ba44075e55e6ee491ab6
SHA2565c17829dda4506f552c6ad96982169a41e6506722ddf31d2476e55ab130b3eb7
SHA512820a9f9c8763148f7a49ad048839d560a1f8656d8f2013a8a21cd22d6d242ec65e715031ad119b377c27dc32ba5e751e649b8b0e3dd6a383c2c93cbbb733b503
-
Filesize
702KB
MD5e84f2033721a0fbf93623a8fb4b4f062
SHA1ee2e2eb31e01fef68bb1d63d6de7e6189a7d0991
SHA2564bcf32823fb089417367f29c8191ffb847314ddec4fd57be1d2820e979cb9bb3
SHA5129cd5e2d923263aa7591d3ae2c5403196f5d30ff8abb278e256be8cde05d718fce7e275c5ed18e387b7064e3a36655e6582d55cff97b6973669ef4b1efe983462