Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe
-
Size
80KB
-
MD5
e8d5a2124e4f77d25ebaf12fd9ceb6ec
-
SHA1
af0f4b79a29cd6cc261578b8670468f0a30ef849
-
SHA256
6ec8f287f96a2504d7e4537c4cee776097e5e2ed9cb55d105fdc11c1c31977f5
-
SHA512
b2ca0ac74ed9253fa157bd45ecd0a1094673fb04694ad4245b2257a8526dc582b1ce3ee4053ad353e39c95cdf81e1cab978e79c5ace08f353b3e03852408a8b8
-
SSDEEP
1536:hwRwO4AXSz2ALVuJtOUi4SVSnLto+BlQRUb3eMHIE62Wnouy82:6Rw1BKTxi4K+BlCUbepE61out2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 13 IoCs
resource yara_rule behavioral1/memory/2552-10-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2552-15-0x0000000002DC0000-0x0000000002DF9000-memory.dmp modiloader_stage2 behavioral1/memory/2100-16-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-20-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-21-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-22-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-23-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-24-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-25-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-26-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-27-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-28-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 behavioral1/memory/2100-29-0x0000000000400000-0x0000000000439000-memory.dmp modiloader_stage2 -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ntdll.lnk msmgrs.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 msmgrs.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wins\setup\msmgrs.exe e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wins\setup\msmgrs.exe e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msmgrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe 2100 msmgrs.exe 2100 msmgrs.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2100 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2100 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2100 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe 30 PID 2552 wrote to memory of 2100 2552 e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe 30 PID 2100 wrote to memory of 280 2100 msmgrs.exe 31 PID 2100 wrote to memory of 280 2100 msmgrs.exe 31 PID 2100 wrote to memory of 280 2100 msmgrs.exe 31 PID 2100 wrote to memory of 280 2100 msmgrs.exe 31 PID 2100 wrote to memory of 308 2100 msmgrs.exe 32 PID 2100 wrote to memory of 308 2100 msmgrs.exe 32 PID 2100 wrote to memory of 308 2100 msmgrs.exe 32 PID 2100 wrote to memory of 308 2100 msmgrs.exe 32 PID 280 wrote to memory of 2704 280 cmd.exe 35 PID 280 wrote to memory of 2704 280 cmd.exe 35 PID 280 wrote to memory of 2704 280 cmd.exe 35 PID 280 wrote to memory of 2704 280 cmd.exe 35 PID 280 wrote to memory of 2704 280 cmd.exe 35 PID 280 wrote to memory of 2704 280 cmd.exe 35 PID 280 wrote to memory of 2704 280 cmd.exe 35 PID 308 wrote to memory of 2132 308 cmd.exe 36 PID 308 wrote to memory of 2132 308 cmd.exe 36 PID 308 wrote to memory of 2132 308 cmd.exe 36 PID 308 wrote to memory of 2132 308 cmd.exe 36 PID 308 wrote to memory of 2132 308 cmd.exe 36 PID 308 wrote to memory of 2132 308 cmd.exe 36 PID 308 wrote to memory of 2132 308 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\wins\setup\msmgrs.exe"C:\Windows\system32\wins\setup\msmgrs.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEditControl.dll3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEditControl.dll4⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/tebedit.ocx3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows/"Downloaded Program Files"/tebedit.ocx4⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5e8d5a2124e4f77d25ebaf12fd9ceb6ec
SHA1af0f4b79a29cd6cc261578b8670468f0a30ef849
SHA2566ec8f287f96a2504d7e4537c4cee776097e5e2ed9cb55d105fdc11c1c31977f5
SHA512b2ca0ac74ed9253fa157bd45ecd0a1094673fb04694ad4245b2257a8526dc582b1ce3ee4053ad353e39c95cdf81e1cab978e79c5ace08f353b3e03852408a8b8