Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe
-
Size
549KB
-
MD5
ebcaa9341c0ef64dd93640c3a6babdd7
-
SHA1
444bd60b88bd077f6a1f01d9537211632be08eb9
-
SHA256
d1d726813376e69f2b92b2492e14ee1361381e41743da9c6f311b374385217ca
-
SHA512
e2ab840cb6a8bbb0245a3e3eeeaa6d968e4a7ab5e06e3a7b07fadd6af13ffcba18ac6cfb5067f970fa00818a7911ed0dfdb69502bc1499d43770b21aa315c4ad
-
SSDEEP
6144:4JelXOlOHOsJb5o+/aiG5eHKudohzF2idZecnl20lHRxp3ggEHtmm48D0v64hhsl:zcsPaBeKugxF3Z4mxxKMm4O19UzqIg
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/452-45-0x0000000000400000-0x00000000004E0000-memory.dmp modiloader_stage2 behavioral2/memory/2568-52-0x0000000000400000-0x00000000004E0000-memory.dmp modiloader_stage2 behavioral2/memory/452-53-0x0000000000400000-0x00000000004E0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2568 wmplayer.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmplayer.exe ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmplayer.exe ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmplayer.exe wmplayer.exe File created C:\Windows\SysWOW64\Deleteme.bat ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 452 wrote to memory of 2568 452 ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe 82 PID 452 wrote to memory of 2568 452 ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe 82 PID 452 wrote to memory of 2568 452 ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe 82 PID 452 wrote to memory of 408 452 ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe 83 PID 452 wrote to memory of 408 452 ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe 83 PID 452 wrote to memory of 408 452 ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebcaa9341c0ef64dd93640c3a6babdd7_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\wmplayer.exeC:\Windows\system32\wmplayer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5cfba06795ffdb72a7e43623f05a13c1b
SHA1807df44eb130e6bea342039f937847f477da1e56
SHA256e75ac24a96d65d94bf825197c66d51ed5aa324333ef4d57f8470b5ac37a86115
SHA5122b2052bda6b375735fc0984c2f5be1052f8052fdec58d2e3742df0a9a3409241acb1e99c3372ee3125d692bb6c11d2997fb808d7acc805c7382d4062c3a642f7
-
Filesize
549KB
MD5ebcaa9341c0ef64dd93640c3a6babdd7
SHA1444bd60b88bd077f6a1f01d9537211632be08eb9
SHA256d1d726813376e69f2b92b2492e14ee1361381e41743da9c6f311b374385217ca
SHA512e2ab840cb6a8bbb0245a3e3eeeaa6d968e4a7ab5e06e3a7b07fadd6af13ffcba18ac6cfb5067f970fa00818a7911ed0dfdb69502bc1499d43770b21aa315c4ad