Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 12:08
Behavioral task
behavioral1
Sample
eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe
-
Size
248KB
-
MD5
eb4daf0d3bce52ce298593c34aaa2785
-
SHA1
62db60c812f1466c035c21dea38c3db9172cff09
-
SHA256
6716fd51bdaf13cb90d4d892489277141e78fc565e64f129f552023286613793
-
SHA512
8045fc6421dc1b0ad1f777e17f1dc2c1872670f239f4f5da3a1b7debdebbbd5f16053fd09dbf0cd7b9ae87d67349b8fe3a50a26005ace5401ca2944f0e235260
-
SSDEEP
6144:kq8IaQI5kdNbcUfz0Xta0AZLwoIOpvfDnPk:kq8/9krIA0ta0Alw1Od7Pk
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/2152-4-0x0000000010000000-0x0000000010044000-memory.dmp modiloader_stage2 behavioral1/files/0x00090000000120f9-19.dat modiloader_stage2 behavioral1/memory/2952-30-0x0000000010000000-0x0000000010044000-memory.dmp modiloader_stage2 behavioral1/memory/3032-50-0x0000000010000000-0x0000000010044000-memory.dmp modiloader_stage2 behavioral1/memory/2356-69-0x0000000010000000-0x0000000010044000-memory.dmp modiloader_stage2 behavioral1/memory/1320-84-0x0000000010000000-0x0000000010044000-memory.dmp modiloader_stage2 behavioral1/memory/2540-100-0x0000000010000000-0x0000000010044000-memory.dmp modiloader_stage2 -
Executes dropped EXE 20 IoCs
pid Process 2952 wuam1grd.exe 2744 wuam1grd.exe 3032 wuam1grd.exe 2224 wuam1grd.exe 2356 wuam1grd.exe 2628 wuam1grd.exe 1320 wuam1grd.exe 1624 wuam1grd.exe 2540 wuam1grd.exe 1600 wuam1grd.exe 404 wuam1grd.exe 2380 wuam1grd.exe 1256 wuam1grd.exe 2980 wuam1grd.exe 1656 wuam1grd.exe 2040 wuam1grd.exe 1516 wuam1grd.exe 2484 wuam1grd.exe 2712 wuam1grd.exe 2264 wuam1grd.exe -
Loads dropped DLL 21 IoCs
pid Process 2248 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 2248 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 2952 wuam1grd.exe 2744 wuam1grd.exe 2744 wuam1grd.exe 2224 wuam1grd.exe 2224 wuam1grd.exe 2628 wuam1grd.exe 2628 wuam1grd.exe 1624 wuam1grd.exe 1624 wuam1grd.exe 1600 wuam1grd.exe 1600 wuam1grd.exe 2380 wuam1grd.exe 2380 wuam1grd.exe 2980 wuam1grd.exe 2980 wuam1grd.exe 2040 wuam1grd.exe 2040 wuam1grd.exe 2484 wuam1grd.exe 2484 wuam1grd.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe File created C:\Windows\SysWOW64\wuam1grd.exe wuam1grd.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2152 set thread context of 2248 2152 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 31 PID 2952 set thread context of 2744 2952 wuam1grd.exe 33 PID 3032 set thread context of 2224 3032 wuam1grd.exe 35 PID 2356 set thread context of 2628 2356 wuam1grd.exe 37 PID 1320 set thread context of 1624 1320 wuam1grd.exe 39 PID 2540 set thread context of 1600 2540 wuam1grd.exe 41 PID 404 set thread context of 2380 404 wuam1grd.exe 43 PID 1256 set thread context of 2980 1256 wuam1grd.exe 45 PID 1656 set thread context of 2040 1656 wuam1grd.exe 47 PID 1516 set thread context of 2484 1516 wuam1grd.exe 49 PID 2712 set thread context of 2264 2712 wuam1grd.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuam1grd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2248 2152 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2248 2152 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2248 2152 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2248 2152 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2248 2152 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 31 PID 2152 wrote to memory of 2248 2152 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 31 PID 2248 wrote to memory of 2952 2248 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2952 2248 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2952 2248 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 32 PID 2248 wrote to memory of 2952 2248 eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe 32 PID 2952 wrote to memory of 2744 2952 wuam1grd.exe 33 PID 2952 wrote to memory of 2744 2952 wuam1grd.exe 33 PID 2952 wrote to memory of 2744 2952 wuam1grd.exe 33 PID 2952 wrote to memory of 2744 2952 wuam1grd.exe 33 PID 2952 wrote to memory of 2744 2952 wuam1grd.exe 33 PID 2952 wrote to memory of 2744 2952 wuam1grd.exe 33 PID 2744 wrote to memory of 3032 2744 wuam1grd.exe 34 PID 2744 wrote to memory of 3032 2744 wuam1grd.exe 34 PID 2744 wrote to memory of 3032 2744 wuam1grd.exe 34 PID 2744 wrote to memory of 3032 2744 wuam1grd.exe 34 PID 3032 wrote to memory of 2224 3032 wuam1grd.exe 35 PID 3032 wrote to memory of 2224 3032 wuam1grd.exe 35 PID 3032 wrote to memory of 2224 3032 wuam1grd.exe 35 PID 3032 wrote to memory of 2224 3032 wuam1grd.exe 35 PID 3032 wrote to memory of 2224 3032 wuam1grd.exe 35 PID 3032 wrote to memory of 2224 3032 wuam1grd.exe 35 PID 2224 wrote to memory of 2356 2224 wuam1grd.exe 36 PID 2224 wrote to memory of 2356 2224 wuam1grd.exe 36 PID 2224 wrote to memory of 2356 2224 wuam1grd.exe 36 PID 2224 wrote to memory of 2356 2224 wuam1grd.exe 36 PID 2356 wrote to memory of 2628 2356 wuam1grd.exe 37 PID 2356 wrote to memory of 2628 2356 wuam1grd.exe 37 PID 2356 wrote to memory of 2628 2356 wuam1grd.exe 37 PID 2356 wrote to memory of 2628 2356 wuam1grd.exe 37 PID 2356 wrote to memory of 2628 2356 wuam1grd.exe 37 PID 2356 wrote to memory of 2628 2356 wuam1grd.exe 37 PID 2628 wrote to memory of 1320 2628 wuam1grd.exe 38 PID 2628 wrote to memory of 1320 2628 wuam1grd.exe 38 PID 2628 wrote to memory of 1320 2628 wuam1grd.exe 38 PID 2628 wrote to memory of 1320 2628 wuam1grd.exe 38 PID 1320 wrote to memory of 1624 1320 wuam1grd.exe 39 PID 1320 wrote to memory of 1624 1320 wuam1grd.exe 39 PID 1320 wrote to memory of 1624 1320 wuam1grd.exe 39 PID 1320 wrote to memory of 1624 1320 wuam1grd.exe 39 PID 1320 wrote to memory of 1624 1320 wuam1grd.exe 39 PID 1320 wrote to memory of 1624 1320 wuam1grd.exe 39 PID 1624 wrote to memory of 2540 1624 wuam1grd.exe 40 PID 1624 wrote to memory of 2540 1624 wuam1grd.exe 40 PID 1624 wrote to memory of 2540 1624 wuam1grd.exe 40 PID 1624 wrote to memory of 2540 1624 wuam1grd.exe 40 PID 2540 wrote to memory of 1600 2540 wuam1grd.exe 41 PID 2540 wrote to memory of 1600 2540 wuam1grd.exe 41 PID 2540 wrote to memory of 1600 2540 wuam1grd.exe 41 PID 2540 wrote to memory of 1600 2540 wuam1grd.exe 41 PID 2540 wrote to memory of 1600 2540 wuam1grd.exe 41 PID 2540 wrote to memory of 1600 2540 wuam1grd.exe 41 PID 1600 wrote to memory of 404 1600 wuam1grd.exe 42 PID 1600 wrote to memory of 404 1600 wuam1grd.exe 42 PID 1600 wrote to memory of 404 1600 wuam1grd.exe 42 PID 1600 wrote to memory of 404 1600 wuam1grd.exe 42 PID 404 wrote to memory of 2380 404 wuam1grd.exe 43 PID 404 wrote to memory of 2380 404 wuam1grd.exe 43 PID 404 wrote to memory of 2380 404 wuam1grd.exe 43 PID 404 wrote to memory of 2380 404 wuam1grd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 492 "C:\Users\Admin\AppData\Local\Temp\eb4daf0d3bce52ce298593c34aaa2785_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 552 "C:\Windows\SysWOW64\wuam1grd.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\system32\wuam1grd.exe 540 "C:\Windows\SysWOW64\wuam1grd.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\wuam1grd.exeC:\Windows\SysWOW64\wuam1grd.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5eb4daf0d3bce52ce298593c34aaa2785
SHA162db60c812f1466c035c21dea38c3db9172cff09
SHA2566716fd51bdaf13cb90d4d892489277141e78fc565e64f129f552023286613793
SHA5128045fc6421dc1b0ad1f777e17f1dc2c1872670f239f4f5da3a1b7debdebbbd5f16053fd09dbf0cd7b9ae87d67349b8fe3a50a26005ace5401ca2944f0e235260