Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe
-
Size
628KB
-
MD5
ecb4f1222d64949eb248795fc1ce5082
-
SHA1
93e0523ad79cee1c5bfca2fbcb759f2b6b878fa9
-
SHA256
cdc2a42cd8b6fc23dd3238786895d9090b469329ef6e45200e13b30e8e9eb5ba
-
SHA512
be423099d7c13dec19ebce6abca739b2db37bd3edfc76ace93c9d79a356120fd028eff44be1e2831bee5a9ef91600d8215af0bd4f60bc21e900aaafc7b12d834
-
SSDEEP
12288:pUaHSIUvBl7H6xDYY7WZrpiB1+F3Z4mxx64IxSo62jDrkAwh0:6aHSIGB96xsY78pif+QmXqsohkDi
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2364-37-0x0000000000400000-0x0000000000515000-memory.dmp modiloader_stage2 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\T: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\P: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\U: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\W: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\Z: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\E: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\I: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\L: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\O: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\R: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\S: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\G: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\J: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\M: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\Q: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\V: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\X: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\Y: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\B: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\H: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\K: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened (read-only) \??\N: ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe File opened for modification F:\AutoRun.inf ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1792 2364 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2504 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2504 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2504 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 30 PID 2364 wrote to memory of 2504 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 30 PID 2364 wrote to memory of 1792 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 31 PID 2364 wrote to memory of 1792 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 31 PID 2364 wrote to memory of 1792 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 31 PID 2364 wrote to memory of 1792 2364 ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecb4f1222d64949eb248795fc1ce5082_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 3122⤵
- Program crash
PID:1792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5d27451cf32abe7a48f20a44c1d240777
SHA1ebe8640298f71d3d7191ea7e7dbf618c4f620d08
SHA256e62b737c2867f81414ff038e3d1ca72a14d77fba22b8f0cb0575e50262eb5568
SHA5121df9eb1cf7d91e2ffc7826af910b26e710d510bc0dbeee85832a43ea3b9da034c905aa24d70fb7311fdee44a9e5b4ff97000ca708de89c9f5354dbf137d73101