Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe
-
Size
630KB
-
MD5
e990d78f4d2cbd5cd0faa5e092a2a685
-
SHA1
b9c3c68db24fa1ef971d7e51d25a1e062a32e7c7
-
SHA256
e2b3705e0d34fbc9018c81ddadf84689a93a9bd14c7fabf16aec2ba3024aa53d
-
SHA512
427ad3a3ba561726397e33bfa5a5ebf04de9e6d618c857e0ad6fb6a3ae950d9734c76dcb5b3a947104e1c8243d2f1b73800355fd1b07c65c267cf269041e9ec6
-
SSDEEP
12288:KlyotBCHI9jfx6/HfnOncchwBq0WG1c2obY7gdRlligwfWB+B2:eyoSIjMHfnYccy80WkociV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral1/files/0x0009000000017051-25.dat modiloader_stage2 behavioral1/memory/2732-34-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral1/memory/1836-56-0x0000000000400000-0x00000000004C4000-memory.dmp modiloader_stage2 behavioral1/memory/2776-49-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral1/memory/2732-44-0x0000000002E60000-0x0000000002F24000-memory.dmp modiloader_stage2 behavioral1/memory/2732-74-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral1/memory/2776-78-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 behavioral1/memory/2732-93-0x0000000000400000-0x00000000004C3200-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2732 4.exe 2776 rejoice47.exe -
Loads dropped DLL 7 IoCs
pid Process 2132 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 2132 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 2732 4.exe 2732 4.exe 2720 WerFault.exe 2720 WerFault.exe 2720 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2776 set thread context of 1836 2776 rejoice47.exe 32 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe 4.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe 4.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat 4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2720 2776 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2732 2132 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 30 PID 2132 wrote to memory of 2732 2132 e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2776 2732 4.exe 31 PID 2732 wrote to memory of 2776 2732 4.exe 31 PID 2732 wrote to memory of 2776 2732 4.exe 31 PID 2732 wrote to memory of 2776 2732 4.exe 31 PID 2776 wrote to memory of 1836 2776 rejoice47.exe 32 PID 2776 wrote to memory of 1836 2776 rejoice47.exe 32 PID 2776 wrote to memory of 1836 2776 rejoice47.exe 32 PID 2776 wrote to memory of 1836 2776 rejoice47.exe 32 PID 2776 wrote to memory of 1836 2776 rejoice47.exe 32 PID 2776 wrote to memory of 1836 2776 rejoice47.exe 32 PID 2776 wrote to memory of 2720 2776 rejoice47.exe 33 PID 2776 wrote to memory of 2720 2776 rejoice47.exe 33 PID 2776 wrote to memory of 2720 2776 rejoice47.exe 33 PID 2776 wrote to memory of 2720 2776 rejoice47.exe 33 PID 2732 wrote to memory of 2868 2732 4.exe 35 PID 2732 wrote to memory of 2868 2732 4.exe 35 PID 2732 wrote to memory of 2868 2732 4.exe 35 PID 2732 wrote to memory of 2868 2732 4.exe 35 PID 2732 wrote to memory of 2868 2732 4.exe 35 PID 2732 wrote to memory of 2868 2732 4.exe 35 PID 2732 wrote to memory of 2868 2732 4.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e990d78f4d2cbd5cd0faa5e092a2a685_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2804⤵
- Loads dropped DLL
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58ae64039d826b5cd7b18f19cd02448fc
SHA19fbbc25be9a768acc0f028a24aa8733f6ab4c80b
SHA256ff89096af7bf23fbabfdf635f6f5707fae6ce937326ba951bdc44abd89b0d175
SHA512f01616a7efb2a2a93430eb72bda046064150f9f8416d421c4f78fa947a2ac75a00ff01097336b53e605d7747a84f1b024381717ccfa5acdfd5bb47b7aaf1bb09
-
Filesize
745KB
MD5969820935859646affcc1907072c1ce1
SHA114d341996340f3db5e2d57113e58fdddc8824cd6
SHA256993d46adceec70bd2e34e8bd4f3d4ef6b7ed998f11082523eb9387df7fbf3ebd
SHA512e7187f36609497119c67f5c9fc85e9ee643a8a321d0854627ebef7dbdd3d2555ac46d3b9385f3361e1e66b63fa4621fecbfc46e52c56f083d33efefb2ea1b80d