Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:52
Behavioral task
behavioral1
Sample
eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe
-
Size
20KB
-
MD5
eab464e1e1102a980966e85ed343805b
-
SHA1
bb8565653c7cebc946e1ecc5373331550a6cfe5e
-
SHA256
39c9e2a25b79ee2213e4ebd82be4e542d5419784c23f2bc22082323b43cf651f
-
SHA512
7a438abc7a621efd39862fd8009ce07c277cd4ee60467fbcc7c389fdb82bfda4bbcb804794cbc7055c9e81a324dcda072da452c5da896521a11b4c09bf068bb2
-
SSDEEP
384:66kmfvjID+AZ39UgfjZN47SEKUxWXmis9dqsN9d26HJClWt:Bkm2/agdOSvXmisXNz26D
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2548-0-0x0000000013140000-0x0000000013151000-memory.dmp modiloader_stage2 behavioral1/memory/2548-8-0x0000000013140000-0x0000000013151000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/memory/2548-0-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/2532-10-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2532-11-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/2532-14-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2548-8-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/2532-6-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2532-16-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 2532 2548 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 30 -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2104 sc.exe 2488 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2532 2548 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2532 2548 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2532 2548 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2532 2548 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2532 2548 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2532 2548 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1724 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 31 PID 2532 wrote to memory of 1724 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 31 PID 2532 wrote to memory of 1724 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 31 PID 2532 wrote to memory of 1724 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 31 PID 2532 wrote to memory of 1620 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 32 PID 2532 wrote to memory of 1620 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 32 PID 2532 wrote to memory of 1620 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 32 PID 2532 wrote to memory of 1620 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 32 PID 1724 wrote to memory of 2936 1724 net.exe 35 PID 1724 wrote to memory of 2936 1724 net.exe 35 PID 1724 wrote to memory of 2936 1724 net.exe 35 PID 1724 wrote to memory of 2936 1724 net.exe 35 PID 1620 wrote to memory of 2716 1620 net.exe 36 PID 1620 wrote to memory of 2716 1620 net.exe 36 PID 1620 wrote to memory of 2716 1620 net.exe 36 PID 1620 wrote to memory of 2716 1620 net.exe 36 PID 2532 wrote to memory of 2104 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 37 PID 2532 wrote to memory of 2104 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 37 PID 2532 wrote to memory of 2104 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 37 PID 2532 wrote to memory of 2104 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 37 PID 2532 wrote to memory of 2488 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 38 PID 2532 wrote to memory of 2488 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 38 PID 2532 wrote to memory of 2488 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 38 PID 2532 wrote to memory of 2488 2532 eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eab464e1e1102a980966e85ed343805b_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2104
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2488
-
-