Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe
-
Size
651KB
-
MD5
e876293a9810ec0ecfc601ea46085bcc
-
SHA1
66f49924fcd15d3abcf81fc5d2cf7892a6312cd7
-
SHA256
4f56bb368527d96479d4e729281dd79ca5a578f07c6e2e1731c9e3a829ebed18
-
SHA512
f2d0efcf16f3ac8701a1ab8ec1c1a7293ca3017f38fa2328e3a2feed6d18c9361d56c2bbab7c5e9e7ddec0d687e63edf79bc1973cf3d39e631938137d44fa926
-
SSDEEP
12288:1JT0tLyhfG2VwLkmoJtR1DNeLjctaiEqXOKF3Z4mxxC7sIcOa/Y91TVKFy:1JAtLEG2mImoJiItaij5QmXssINwr4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/1612-36-0x0000000000400000-0x0000000000516000-memory.dmp modiloader_stage2 behavioral2/memory/3860-39-0x0000000000400000-0x0000000000516000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3860 svhosv.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\K: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\B: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\Q: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\S: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\W: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\T: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\G: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\I: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\L: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\M: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\N: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\O: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\R: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\Y: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\Z: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\A: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\H: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\J: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\P: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\U: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\V: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened (read-only) \??\X: e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened for modification C:\AutoRun.inf e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File created F:\AutoRun.inf e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened for modification F:\AutoRun.inf e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_svhosv.exe svhosv.exe File opened for modification C:\Windows\SysWOW64\_svhosv.exe svhosv.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\svhosv.exe e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File opened for modification C:\Windows\svhosv.exe e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe File created C:\Windows\ReDelBat.bat e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1128 3860 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhosv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3860 1612 e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe 82 PID 1612 wrote to memory of 3860 1612 e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe 82 PID 1612 wrote to memory of 3860 1612 e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe 82 PID 3860 wrote to memory of 4588 3860 svhosv.exe 83 PID 3860 wrote to memory of 4588 3860 svhosv.exe 83 PID 3860 wrote to memory of 4588 3860 svhosv.exe 83 PID 1612 wrote to memory of 856 1612 e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe 89 PID 1612 wrote to memory of 856 1612 e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe 89 PID 1612 wrote to memory of 856 1612 e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e876293a9810ec0ecfc601ea46085bcc_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\svhosv.exeC:\Windows\svhosv.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 6963⤵
- Program crash
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\ReDelBat.bat2⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3860 -ip 38601⤵PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD50545be25bed9bc01900c984e8fe4ca11
SHA122efc551bd2b4795d2e42f1bd30051489b7b645c
SHA2567472bb618c67988ecdd4e82eabff7fba776dce699d9cf7f75e97dad496f59edb
SHA512e5d2759bf4b1e6798f6003baeaec5f316e16c3feda72e133c312233c993e9fda580a7b690f7f1b9e59417aab9b7063b5355721ed77df7e8b47934f01b1d4e30f
-
Filesize
651KB
MD5e876293a9810ec0ecfc601ea46085bcc
SHA166f49924fcd15d3abcf81fc5d2cf7892a6312cd7
SHA2564f56bb368527d96479d4e729281dd79ca5a578f07c6e2e1731c9e3a829ebed18
SHA512f2d0efcf16f3ac8701a1ab8ec1c1a7293ca3017f38fa2328e3a2feed6d18c9361d56c2bbab7c5e9e7ddec0d687e63edf79bc1973cf3d39e631938137d44fa926