Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe
-
Size
580KB
-
MD5
e86b24a72da5180338fd892d5c8499bf
-
SHA1
d3c5ede7ca003f3207c7c38a4d9f17384123bb15
-
SHA256
f99dca4955fdfd823e3f8ac1a52d0af54049322ff286a86f532d1755305d90d1
-
SHA512
902a6bad0b5458aeba6dd9f5cc256960fb1bacbe9dd80ac9e03f9917df15d464398b72750f1f73dd3fbe05873f20fe71f6dd1be59e31a4213644e8c97ca4afbd
-
SSDEEP
12288:LZdSC9uA/KLnCQjThsekLsdGotF3Z4mxxBoEtlK+kt9T2M9v:LV9uA/KLzjTaeMsdGKQmXiG4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2480-95-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 behavioral1/memory/2148-162-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 behavioral1/memory/2480-173-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1304 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2148 360rpt.exe -
Loads dropped DLL 5 IoCs
pid Process 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 908 WerFault.exe 908 WerFault.exe 908 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_360rpt.exe 360rpt.exe File opened for modification C:\Windows\SysWOW64\_360rpt.exe 360rpt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 1036 2148 360rpt.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 908 2148 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360rpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2148 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2148 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2148 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 30 PID 2480 wrote to memory of 2148 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 30 PID 2148 wrote to memory of 1036 2148 360rpt.exe 31 PID 2148 wrote to memory of 1036 2148 360rpt.exe 31 PID 2148 wrote to memory of 1036 2148 360rpt.exe 31 PID 2148 wrote to memory of 1036 2148 360rpt.exe 31 PID 2148 wrote to memory of 1036 2148 360rpt.exe 31 PID 2148 wrote to memory of 1036 2148 360rpt.exe 31 PID 2148 wrote to memory of 908 2148 360rpt.exe 32 PID 2148 wrote to memory of 908 2148 360rpt.exe 32 PID 2148 wrote to memory of 908 2148 360rpt.exe 32 PID 2148 wrote to memory of 908 2148 360rpt.exe 32 PID 2480 wrote to memory of 1304 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 33 PID 2480 wrote to memory of 1304 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 33 PID 2480 wrote to memory of 1304 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 33 PID 2480 wrote to memory of 1304 2480 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5d0115c9700fba109845d765a247ca2bd
SHA1158269d93554eea9356e679613c03716097f651e
SHA2561e3fd2e4e074f6b7f93f2d0c1a0b0093cfbc7056cfdce06cd2b3038cc4e39959
SHA512a0bce196de809d029d9656b7f73fb9429401789cfa4f4bf2690472ba469de1dcd7ca369be22717a72e2e308e49d6b2fd7e1fefd4424738e731ae4f8c038330ec
-
Filesize
580KB
MD5e86b24a72da5180338fd892d5c8499bf
SHA1d3c5ede7ca003f3207c7c38a4d9f17384123bb15
SHA256f99dca4955fdfd823e3f8ac1a52d0af54049322ff286a86f532d1755305d90d1
SHA512902a6bad0b5458aeba6dd9f5cc256960fb1bacbe9dd80ac9e03f9917df15d464398b72750f1f73dd3fbe05873f20fe71f6dd1be59e31a4213644e8c97ca4afbd