Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe
-
Size
216KB
-
MD5
ec915d1633b2e2e03759fb0186597219
-
SHA1
754bae3b2c79233a1ebf60f3bc8e58f641ae9590
-
SHA256
9088b50009559b0862fe45c39f6686b3f3f84133ce2f8bec7165957eb270be5f
-
SHA512
ab38e1c48d4af07c7a7e1679257286c9131cbfa52fb1653bf0cf2ce7db37dc1888a33f6d224089de94b42c5577e3118096f86618c9c69f2512d349a182d751a5
-
SSDEEP
6144:EQaTpvBwDdO/tRmYRcNm9ashRC3jaTcRkIWOcMn:kNmD8fmqBjhRC3OeXb
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1568-3-0x0000000000400000-0x0000000000436000-memory.dmp modiloader_stage2 behavioral1/memory/1568-37-0x0000000000400000-0x0000000000436000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2216 server.exe -
Loads dropped DLL 2 IoCs
pid Process 1568 ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe 1568 ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 server.exe 2216 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1568 wrote to memory of 2216 1568 ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe 29 PID 1568 wrote to memory of 2216 1568 ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe 29 PID 1568 wrote to memory of 2216 1568 ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe 29 PID 1568 wrote to memory of 2216 1568 ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe 29 PID 2216 wrote to memory of 1244 2216 server.exe 20 PID 2216 wrote to memory of 1244 2216 server.exe 20 PID 2216 wrote to memory of 1244 2216 server.exe 20 PID 2216 wrote to memory of 1244 2216 server.exe 20 PID 2216 wrote to memory of 1244 2216 server.exe 20 PID 2216 wrote to memory of 1244 2216 server.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec915d1633b2e2e03759fb0186597219_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5d92264ef57c79e5e9bf94937edb0b2ce
SHA180b228b414dd05695340ec841e6872030a9a8acd
SHA25647c06e958f650f52b50bb9b097e215150240e3fc8422462d7cbfce1cc4980e87
SHA5127e66767a83d83d9b58a31dc112bc703626c8d6e6409790adbe3749f27117a25914472a1a36e0f72e0ca401670efba1d7931c7de46684ddf3f9b4f56427361092
-
Filesize
28KB
MD5862fac7c3da2182585c3f868b760b1fb
SHA185d3526f800d091961e0948e1586748c0f9b6946
SHA2563a7aaaaafb806d6bf2f928a62c543aa32a10f72434447c93b63335c35341c0a7
SHA5127f1fc4713a6816865ec2ad76970e3bb16e7cbe20340cbc3137acfe7e5942d3ccdf720ef7d59878946d3de9aed38a5b7c30cf100fada46ba79cb3d9b9fec05908