Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 15:16
Behavioral task
behavioral1
Sample
e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe
-
Size
452KB
-
MD5
e96800ae23a730ccd793032c61fecb96
-
SHA1
0c3456491e07c8c0c63aa5a3c1bf1f49adc85380
-
SHA256
6a881171422294e2d51460e3a47164fdb5dbcaa21820da25748a081985f7736d
-
SHA512
f7f02f405031ac550457fae091e6703eaa09c29e726634fe9ba1232e7a409512a07457c5c21fa30ffb5aabebbf9053de0fa0297d6f81f0eee09f114f6e745085
-
SSDEEP
12288:NhK9DAJVeDDimDeUWmQ2zXSmoLnTuEcLUS:NhKyVgiLUWmQ2zXSmEnTuEcUS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\System32\\userinit.exe,\"C:\\Users\\Admin\\Favorites\\netservice.exe\"un userinit.exe" e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/files/0x00070000000160da-3.dat modiloader_stage2 behavioral1/memory/1668-10-0x0000000013140000-0x00000000131B7000-memory.dmp modiloader_stage2 behavioral1/files/0x0007000000016141-13.dat modiloader_stage2 behavioral1/memory/2448-15-0x0000000013140000-0x00000000131B7000-memory.dmp modiloader_stage2 behavioral1/memory/2268-16-0x00000000005B0000-0x0000000000618000-memory.dmp modiloader_stage2 behavioral1/memory/2268-17-0x00000000005B0000-0x0000000000618000-memory.dmp modiloader_stage2 behavioral1/memory/2268-19-0x00000000005B0000-0x0000000000618000-memory.dmp modiloader_stage2 -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netrt\Parameters\ServiceDll = "C:\\Windows\\System32\\sysn.dll" e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 netservice.exe -
Loads dropped DLL 3 IoCs
pid Process 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 2268 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysn.dll e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysn.dll e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1668 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 31 PID 2448 wrote to memory of 1668 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 31 PID 2448 wrote to memory of 1668 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 31 PID 2448 wrote to memory of 1668 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 31 PID 2448 wrote to memory of 2352 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 32 PID 2448 wrote to memory of 2352 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 32 PID 2448 wrote to memory of 2352 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 32 PID 2448 wrote to memory of 2352 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 32 PID 2448 wrote to memory of 2708 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 35 PID 2448 wrote to memory of 2708 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 35 PID 2448 wrote to memory of 2708 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 35 PID 2448 wrote to memory of 2708 2448 e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\Favorites\netservice.exeC:\Users\Admin\Favorites\netservice.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\e96800ae23a730ccd793032c61fecb96_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2708
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k network1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD53d604731fc9caa8049b3846428348cce
SHA1891a03ce65b8d4d5ccf1259a3a2e35533556cca1
SHA2563097e98fac6157d231ecec265bf226d39fe9883d1eb548f88b0f43e8c60ebe4c
SHA512dbad9a6bfe1f1fa956bfaeb15e2e178756e7b646a381e4cf4f666db8c8799ca9f06764466bce024aa8b8cabddc483e3a930d1700b10b0136186c9b47542eacb4
-
Filesize
452KB
MD5e96800ae23a730ccd793032c61fecb96
SHA10c3456491e07c8c0c63aa5a3c1bf1f49adc85380
SHA2566a881171422294e2d51460e3a47164fdb5dbcaa21820da25748a081985f7736d
SHA512f7f02f405031ac550457fae091e6703eaa09c29e726634fe9ba1232e7a409512a07457c5c21fa30ffb5aabebbf9053de0fa0297d6f81f0eee09f114f6e745085