Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 09:31
Behavioral task
behavioral1
Sample
e8cfee0d6b806782b539573677462894_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e8cfee0d6b806782b539573677462894_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e8cfee0d6b806782b539573677462894_JaffaCakes118.exe
-
Size
82KB
-
MD5
e8cfee0d6b806782b539573677462894
-
SHA1
14675c8cc5d597c45121c649f9c24db4f0e936dc
-
SHA256
6dc77c44cc9f926705aa069f72a9e3608a07e9e4b87ef352f29bafff7ce42be2
-
SHA512
23abc196c6a4d3770adb7fda32cbacf51cc9d5588c384a5f01239840ebaf9a5d97a3d862b13fa73206106a543426dbd4d7f395a5d604804c69d4bc56e66d90f7
-
SSDEEP
1536:5CGcRjb81YcIpo8Fi0Gkffx2xWHXvmF9HRKw+gL:S8OcGoreZHXvC1RKCL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2420-7-0x0000000000400000-0x000000000041B000-memory.dmp modiloader_stage2 behavioral1/files/0x0007000000018708-8.dat modiloader_stage2 behavioral1/memory/2796-16-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 behavioral1/memory/1536-35-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 4 IoCs
pid Process 2796 Systemloader.exe 2680 Systemloader.exe 1536 ctfmon32.exe 2144 ctfmon32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services M7 = "ctfmon32.exe" Systemloader.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2796 set thread context of 2680 2796 Systemloader.exe 31 PID 1536 set thread context of 2144 1536 ctfmon32.exe 33 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ctfmon32.exe Systemloader.exe File created C:\Windows\ctfmon32.exe Systemloader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8cfee0d6b806782b539573677462894_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2796 2420 e8cfee0d6b806782b539573677462894_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2796 2420 e8cfee0d6b806782b539573677462894_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2796 2420 e8cfee0d6b806782b539573677462894_JaffaCakes118.exe 30 PID 2420 wrote to memory of 2796 2420 e8cfee0d6b806782b539573677462894_JaffaCakes118.exe 30 PID 2796 wrote to memory of 2680 2796 Systemloader.exe 31 PID 2796 wrote to memory of 2680 2796 Systemloader.exe 31 PID 2796 wrote to memory of 2680 2796 Systemloader.exe 31 PID 2796 wrote to memory of 2680 2796 Systemloader.exe 31 PID 2796 wrote to memory of 2680 2796 Systemloader.exe 31 PID 2796 wrote to memory of 2680 2796 Systemloader.exe 31 PID 2680 wrote to memory of 1536 2680 Systemloader.exe 32 PID 2680 wrote to memory of 1536 2680 Systemloader.exe 32 PID 2680 wrote to memory of 1536 2680 Systemloader.exe 32 PID 2680 wrote to memory of 1536 2680 Systemloader.exe 32 PID 1536 wrote to memory of 2144 1536 ctfmon32.exe 33 PID 1536 wrote to memory of 2144 1536 ctfmon32.exe 33 PID 1536 wrote to memory of 2144 1536 ctfmon32.exe 33 PID 1536 wrote to memory of 2144 1536 ctfmon32.exe 33 PID 1536 wrote to memory of 2144 1536 ctfmon32.exe 33 PID 1536 wrote to memory of 2144 1536 ctfmon32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8cfee0d6b806782b539573677462894_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8cfee0d6b806782b539573677462894_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Systemloader.exe"C:\Systemloader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Systemloader.exeC:\Systemloader.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\ctfmon32.exe"C:\Windows\ctfmon32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\ctfmon32.exeC:\Windows\ctfmon32.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5c77dcc7f2749c037dfa8ad8d3865e187
SHA12c9aab9dc22aed651693114d41e29e8d4e0b8510
SHA2561c720034e3a522781e6ed6229f449df5ea7e515b465cf9e69f302f036b3ca4f3
SHA512103fe188d36e05b515a159ea2bbf5d1d5fe68346b0700b987bc380d250ddf20282eef3485e0fac080362822567ace70c292ee0432f802e458b61bcac37f1b28a
-
Filesize
22KB
MD51b58ac36575d9c69123aaba7aef86e8a
SHA121146726066641d70a3f800d339b428f8042f714
SHA256b632e67b6e4b6c417c3e39e1c15ca2762158a01e81a3e5e1157ec6acd379779f
SHA512503ab01530714abf076f786e397e14b0c08e31fe3e3bcb6a0e38c2c767e65cb5c5755f131c426ce290a7bfe73876a3c36225da258db2ca4a5dc583d4aca0af6e