Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe
-
Size
204KB
-
MD5
e8ace73a999d2903bd2c05f398b10a9d
-
SHA1
d5427899a3565a29a7f0d23a728cba2b9a68ecd5
-
SHA256
9147f94fee44882570ddeb67f85bb69de3b27bfc54a3a16d57db6d9d8ffd88b5
-
SHA512
07b9366e2be0e9943b7c7bc64023fad85f60181c48b71aaaee53c1b82aac3a60ec2c5e79cc6856b6d5b81ac71e812f1d38fe0395329792ea706aa41e16d65199
-
SSDEEP
3072:5kX7jGBkSrwYSjEHrq8Lbph1nf2TW+e4Z+XTwoJ+SfS04FKc942dn70Ds7OCPwN:20kqSjELb3pXf2TRe4ifG9B7pOHN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/2984-37-0x0000000000D80000-0x0000000000DEC000-memory.dmp modiloader_stage2 behavioral1/memory/2724-29-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral1/memory/2712-42-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral1/memory/2984-44-0x0000000000D80000-0x0000000000DEC000-memory.dmp modiloader_stage2 behavioral1/memory/1708-45-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral1/memory/1708-66-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 behavioral1/memory/1708-74-0x0000000000400000-0x000000000046C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2724 server.exe 2712 Winservices.exe 1708 server.exe -
Loads dropped DLL 6 IoCs
pid Process 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 2724 server.exe 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 1708 server.exe -
resource yara_rule behavioral1/files/0x0009000000015689-40.dat upx behavioral1/memory/2712-31-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2724-29-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2724-17-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2984-14-0x0000000000D80000-0x0000000000DEC000-memory.dmp upx behavioral1/memory/2712-42-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1708-45-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1708-66-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1708-74-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SysServices = "C:\\Windows\\Winservices.exe" Winservices.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Winservices.exe server.exe File opened for modification C:\Windows\Winservices.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Winservices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 Winservices.exe 1708 server.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2724 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2724 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2724 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2724 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2724 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2724 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2724 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 30 PID 2724 wrote to memory of 2712 2724 server.exe 31 PID 2724 wrote to memory of 2712 2724 server.exe 31 PID 2724 wrote to memory of 2712 2724 server.exe 31 PID 2724 wrote to memory of 2712 2724 server.exe 31 PID 2724 wrote to memory of 2712 2724 server.exe 31 PID 2724 wrote to memory of 2712 2724 server.exe 31 PID 2724 wrote to memory of 2712 2724 server.exe 31 PID 2984 wrote to memory of 1708 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1708 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1708 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1708 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1708 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1708 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 32 PID 2984 wrote to memory of 1708 2984 e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8ace73a999d2903bd2c05f398b10a9d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Winservices.exe"C:\Windows\Winservices.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5ad5c8b40cc0ccc04bcc77a887c0a4cfd
SHA18724d02a3805b75ac785edd2af91d6c8dd24ff3c
SHA2566c9d0cb6cde626c5e336e9fa06dcb9f1578eb6367c5daf6407176a57f0f3c2ac
SHA5129af31198ecbf4132474d36eda4a30f37771dfbbee277a94ec91d2be9d73d3b3eab9ee756cbf9cc2a70174ddf90e2f0e6fc484f1f0778d0d98cdefc912b4d89f0