Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe
-
Size
580KB
-
MD5
e86b24a72da5180338fd892d5c8499bf
-
SHA1
d3c5ede7ca003f3207c7c38a4d9f17384123bb15
-
SHA256
f99dca4955fdfd823e3f8ac1a52d0af54049322ff286a86f532d1755305d90d1
-
SHA512
902a6bad0b5458aeba6dd9f5cc256960fb1bacbe9dd80ac9e03f9917df15d464398b72750f1f73dd3fbe05873f20fe71f6dd1be59e31a4213644e8c97ca4afbd
-
SSDEEP
12288:LZdSC9uA/KLnCQjThsekLsdGotF3Z4mxxBoEtlK+kt9T2M9v:LV9uA/KLzjTaeMsdGKQmXiG4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/2588-11-0x0000000003390000-0x000000000343B000-memory.dmp modiloader_stage2 behavioral2/memory/948-84-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 behavioral2/memory/2588-86-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 948 360rpt.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\_360rpt.exe 360rpt.exe File created C:\Windows\SysWOW64\_360rpt.exe 360rpt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 948 set thread context of 1084 948 360rpt.exe 83 PID 948 set thread context of 3940 948 360rpt.exe 85 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2236 3940 WerFault.exe 85 3660 1084 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360rpt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2588 wrote to memory of 948 2588 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 82 PID 2588 wrote to memory of 948 2588 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 82 PID 2588 wrote to memory of 948 2588 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 82 PID 948 wrote to memory of 1084 948 360rpt.exe 83 PID 948 wrote to memory of 1084 948 360rpt.exe 83 PID 948 wrote to memory of 1084 948 360rpt.exe 83 PID 948 wrote to memory of 1084 948 360rpt.exe 83 PID 948 wrote to memory of 1084 948 360rpt.exe 83 PID 948 wrote to memory of 3940 948 360rpt.exe 85 PID 948 wrote to memory of 3940 948 360rpt.exe 85 PID 948 wrote to memory of 3940 948 360rpt.exe 85 PID 948 wrote to memory of 3940 948 360rpt.exe 85 PID 948 wrote to memory of 3940 948 360rpt.exe 85 PID 2588 wrote to memory of 4648 2588 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 86 PID 2588 wrote to memory of 4648 2588 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 86 PID 2588 wrote to memory of 4648 2588 e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e86b24a72da5180338fd892d5c8499bf_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\360rpt.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 124⤵
- Program crash
PID:3660
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 124⤵
- Program crash
PID:2236
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3940 -ip 39401⤵PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1084 -ip 10841⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5d0115c9700fba109845d765a247ca2bd
SHA1158269d93554eea9356e679613c03716097f651e
SHA2561e3fd2e4e074f6b7f93f2d0c1a0b0093cfbc7056cfdce06cd2b3038cc4e39959
SHA512a0bce196de809d029d9656b7f73fb9429401789cfa4f4bf2690472ba469de1dcd7ca369be22717a72e2e308e49d6b2fd7e1fefd4424738e731ae4f8c038330ec
-
Filesize
580KB
MD5e86b24a72da5180338fd892d5c8499bf
SHA1d3c5ede7ca003f3207c7c38a4d9f17384123bb15
SHA256f99dca4955fdfd823e3f8ac1a52d0af54049322ff286a86f532d1755305d90d1
SHA512902a6bad0b5458aeba6dd9f5cc256960fb1bacbe9dd80ac9e03f9917df15d464398b72750f1f73dd3fbe05873f20fe71f6dd1be59e31a4213644e8c97ca4afbd