Analysis
-
max time kernel
143s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 17:08
Behavioral task
behavioral1
Sample
ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
ebceb7f190b577c1f70dd6bc1b8733a8
-
SHA1
3f8707b124e18d2d37f2a880e9fe4fa900e4c215
-
SHA256
b05e70f56f91954cf0a9cfc72ec5a3a4cf5c6b4ec9703d5b87119121e0cc4356
-
SHA512
e9386a91c23dc3e878602a0a09935569f7391d901508847300595bdf059191440d1fc893beddb1b5db22f59012889af8fb1e8379d2a8cb194c6571d6e7aa739e
-
SSDEEP
49152:OHvteiw6NuUmeT0EUzgf4TmT9DTe2HVdpnu:YeUuUmeTfGgfBTFX1Xu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/2224-28-0x0000000000400000-0x0000000000523000-memory.dmp modiloader_stage2 behavioral1/memory/2224-42-0x0000000000400000-0x0000000000523000-memory.dmp modiloader_stage2 behavioral1/memory/2224-61-0x00000000041A0000-0x00000000042C3000-memory.dmp modiloader_stage2 behavioral1/memory/2704-65-0x0000000000400000-0x0000000000523000-memory.dmp modiloader_stage2 behavioral1/memory/2224-67-0x0000000000400000-0x0000000000523000-memory.dmp modiloader_stage2 behavioral1/memory/2704-73-0x0000000000400000-0x0000000000523000-memory.dmp modiloader_stage2 behavioral1/memory/2224-87-0x0000000000400000-0x0000000000523000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2224 yes.exe 2668 ×îмÛÖµ800ÔªµÄvipÍøÂí.exe 2704 fucke.exe -
Loads dropped DLL 6 IoCs
pid Process 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 2224 yes.exe 2224 yes.exe -
resource yara_rule behavioral1/files/0x0007000000018b4d-34.dat themida behavioral1/memory/2668-52-0x0000000000400000-0x0000000000BD3994-memory.dmp themida -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\fucke.exe yes.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\fucke.exe yes.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat yes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2580 2704 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ×îмÛÖµ800ÔªµÄvipÍøÂí.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fucke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2668 ×îмÛÖµ800ÔªµÄvipÍøÂí.exe 2668 ×îмÛÖµ800ÔªµÄvipÍøÂí.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2224 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2224 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2224 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2224 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2668 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2668 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2668 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 30 PID 2180 wrote to memory of 2668 2180 ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe 30 PID 2224 wrote to memory of 2704 2224 yes.exe 31 PID 2224 wrote to memory of 2704 2224 yes.exe 31 PID 2224 wrote to memory of 2704 2224 yes.exe 31 PID 2224 wrote to memory of 2704 2224 yes.exe 31 PID 2704 wrote to memory of 2556 2704 fucke.exe 32 PID 2704 wrote to memory of 2556 2704 fucke.exe 32 PID 2704 wrote to memory of 2556 2704 fucke.exe 32 PID 2704 wrote to memory of 2556 2704 fucke.exe 32 PID 2704 wrote to memory of 2580 2704 fucke.exe 33 PID 2704 wrote to memory of 2580 2704 fucke.exe 33 PID 2704 wrote to memory of 2580 2704 fucke.exe 33 PID 2704 wrote to memory of 2580 2704 fucke.exe 33 PID 2224 wrote to memory of 644 2224 yes.exe 34 PID 2224 wrote to memory of 644 2224 yes.exe 34 PID 2224 wrote to memory of 644 2224 yes.exe 34 PID 2224 wrote to memory of 644 2224 yes.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebceb7f190b577c1f70dd6bc1b8733a8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\yes.exe"C:\Users\Admin\AppData\Local\Temp\yes.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\fucke.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\fucke.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"4⤵PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 3164⤵
- Program crash
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""3⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
-
C:\Users\Admin\AppData\Local\Temp\×îмÛÖµ800ÔªµÄvipÍøÂí.exe"C:\Users\Admin\AppData\Local\Temp\×îмÛÖµ800ÔªµÄvipÍøÂí.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD51a19b66d8c59eec1d0ae07917d9a1656
SHA1699cc9d5e9172c30087ef49e7d26cb0661f749b5
SHA256b7afea92c7e76f356807b7abe5245fff095dc4b1ff1ccf68a46766ede463ef5b
SHA51217a041378423cf0b4fc8f4159da32d5f445a8e25eeed8a8a75f258c668601050f5b7d6ef4a2d9b2ae6bf70c84c7fc09b64b8001ee5aea2c7190326b6506b61af
-
Filesize
614KB
MD5063a93e89748df2b0ecd06db45d872ad
SHA1c4af0bb94e9b0e2aeaf06e2f6f5c94a6b4b2fb3d
SHA256b2a70b166799b0718c025313c7b493d7848fc389610912b8f6d5c07d5cdb59c7
SHA512d07d596001243f22b9002ef0a389c71b3e82d4112374ef02afd0332f5e4a78f8b67c86a8b062c79e5b8f935d552e4de6740d06c6074bd5d03de2e9e6d66d43d9
-
Filesize
846KB
MD5dbf8fcead59524b9b685c03e0adf84a2
SHA145bb0a95d571ed76a731d77e6ff045151a465702
SHA256e51478dceda2da5066fbfb7203dbbe55f8f0f717ecc2eaa7d1a9e38decdf1dc9
SHA512d0cd741c208dda40f68d7bd9dfc6eca68a41e9d01e429fe10cf2110da1d292c94bd9f776a55e8f2ab6442be698d22b1cc910ae017b4f4e4ec2717ad74c26516f