Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 06:31
Behavioral task
behavioral1
Sample
e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe
-
Size
775KB
-
MD5
e88453649bede9e1ccf10f592ef4f238
-
SHA1
c25229054f50bbf561cf60199dbcbe2474fbd0e7
-
SHA256
318d8840b3c40143c5aa9c76b965c2ff39ca2a647ace83b21fbc5cf487c052b8
-
SHA512
023cb3749c85075938159428672694d725403888b46a3388a69fd5aa5db5c54b1d99eadf1f8f0a6443b7b3a8b013872b459320c29cd8b82082d3e9c2f9844c8a
-
SSDEEP
12288:rx/ug1QFJxIi18jPqqQW8ZEQDRqCemBPtIvVXT026Kp:rx/S2i182q0pHx89XTHp
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/1800-0-0x0000000000400000-0x00000000004CB200-memory.dmp modiloader_stage2 behavioral1/files/0x00090000000120ce-4.dat modiloader_stage2 behavioral1/memory/2124-13-0x0000000000400000-0x00000000004CB200-memory.dmp modiloader_stage2 behavioral1/memory/2144-22-0x0000000000400000-0x00000000004CC000-memory.dmp modiloader_stage2 behavioral1/memory/1800-27-0x0000000000400000-0x00000000004CB200-memory.dmp modiloader_stage2 behavioral1/memory/2124-29-0x0000000000400000-0x00000000004CB200-memory.dmp modiloader_stage2 behavioral1/memory/1800-42-0x0000000000400000-0x00000000004CB200-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1164 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 rejoice46.exe -
Loads dropped DLL 5 IoCs
pid Process 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 2752 WerFault.exe 2752 WerFault.exe 2752 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe File opened for modification C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 2144 2124 rejoice46.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2752 2124 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2124 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2124 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2124 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 30 PID 1800 wrote to memory of 2124 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2144 2124 rejoice46.exe 31 PID 2124 wrote to memory of 2144 2124 rejoice46.exe 31 PID 2124 wrote to memory of 2144 2124 rejoice46.exe 31 PID 2124 wrote to memory of 2144 2124 rejoice46.exe 31 PID 2124 wrote to memory of 2144 2124 rejoice46.exe 31 PID 2124 wrote to memory of 2144 2124 rejoice46.exe 31 PID 2124 wrote to memory of 2752 2124 rejoice46.exe 32 PID 2124 wrote to memory of 2752 2124 rejoice46.exe 32 PID 2124 wrote to memory of 2752 2124 rejoice46.exe 32 PID 2124 wrote to memory of 2752 2124 rejoice46.exe 32 PID 1800 wrote to memory of 1164 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 34 PID 1800 wrote to memory of 1164 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 34 PID 1800 wrote to memory of 1164 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 34 PID 1800 wrote to memory of 1164 1800 e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e88453649bede9e1ccf10f592ef4f238_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c2492bfe2519229654627b40d964c1b0
SHA1dd394d561dca545b2d2c156770d13e06a54aa1ec
SHA25689fc6af367b6f1642cd1a1c45475fb85ffc21d7b9b3303b2602c80f466f4a11a
SHA512c19b9bfc851d0bd3b9b3af6886953a815eb8588088e77c7e283bb39fb10ae1377f237c10fe7320836ef0b7ae01139e9e4b10705bf0e55e589b03a7edeba7e515
-
Filesize
775KB
MD5e88453649bede9e1ccf10f592ef4f238
SHA1c25229054f50bbf561cf60199dbcbe2474fbd0e7
SHA256318d8840b3c40143c5aa9c76b965c2ff39ca2a647ace83b21fbc5cf487c052b8
SHA512023cb3749c85075938159428672694d725403888b46a3388a69fd5aa5db5c54b1d99eadf1f8f0a6443b7b3a8b013872b459320c29cd8b82082d3e9c2f9844c8a