Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
-
Size
31KB
-
MD5
ec8a75d9f4a68aba550ed977b4c46338
-
SHA1
5e03b977aa2471ffd0f66f3075614dfcf0d1ea74
-
SHA256
59d6bf9401c5c406397cf29ebe1a3b5c7a071ee4a2c6ff423dfe103b16d06752
-
SHA512
61239cdd94c47dec7078409f3514d34353d8007f8fb7f849c40d83660eedc880c2ea23920a054d9be9c202b3263f312ab004a98fcf06d1f94fd6ca55e3fc9d20
-
SSDEEP
384:sTFJ4v3vhO//Xs15JVVorU8a1wNEz4FLjc8W7Q36umLy2v+3iKwKwjjrAEi:sT7QSk/jfZ0FLHOQ36P7d/vni
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral1/memory/1776-17-0x0000000000200000-0x000000000020D000-memory.dmp modiloader_stage2 behavioral1/memory/2384-20-0x0000000000400000-0x0000000000602000-memory.dmp modiloader_stage2 behavioral1/memory/2384-19-0x0000000000400000-0x0000000000602000-memory.dmp modiloader_stage2 behavioral1/memory/2384-18-0x0000000000400000-0x0000000000602000-memory.dmp modiloader_stage2 behavioral1/memory/2384-15-0x0000000000400000-0x0000000000602000-memory.dmp modiloader_stage2 behavioral1/memory/2384-21-0x0000000000400000-0x0000000000602000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1776 isilis.exe 2384 isilis.exe -
Loads dropped DLL 3 IoCs
pid Process 1928 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 1928 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 1776 isilis.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1776 set thread context of 2384 1776 isilis.exe 31 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\file.exe isilis.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isilis.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1776 1928 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 30 PID 1928 wrote to memory of 1776 1928 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 30 PID 1928 wrote to memory of 1776 1928 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 30 PID 1928 wrote to memory of 1776 1928 ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe 30 PID 1776 wrote to memory of 2384 1776 isilis.exe 31 PID 1776 wrote to memory of 2384 1776 isilis.exe 31 PID 1776 wrote to memory of 2384 1776 isilis.exe 31 PID 1776 wrote to memory of 2384 1776 isilis.exe 31 PID 1776 wrote to memory of 2384 1776 isilis.exe 31 PID 1776 wrote to memory of 2384 1776 isilis.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\isilis.exe"C:\Users\Admin\AppData\Local\Temp\isilis.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\isilis.exe"C:\Users\Admin\AppData\Local\Temp\isilis.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5f101431a309a8878814cf361b695ff15
SHA17046c3acaa39f67f8a7fe99603781da4efa2d9ef
SHA2564ada327ca2cb6da54dbc8faadc87a77d7741336103c94e9156059610910b6e14
SHA51292ba81b13c23dd91737355bd2669b4dfff8f5f7b7c670dde4527eec87d03ab9b0b154dfa9476ee5769105e16bd1f7a3a81df4e0f07f055f50ecf6e8db26ae5c1