Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe
-
Size
262KB
-
MD5
ed0133ad9f3b391808812eba802cbfda
-
SHA1
147295047fe53facf4376fccd8c63322bd2a609d
-
SHA256
6e62ee6efbbc28df21db6a3ce1504a54f5d25dc7f948e209aa3c43f58b884989
-
SHA512
09e47d4c9c3f64c483812aa3bad96528b602fa1e82c1483e4d35135daaac8d15a680bb7ae96b0f2ec62367df5bbdabab3207a653f2e44b50f8e8afdd74ba2377
-
SSDEEP
6144:o0iKbTXzbHWfCoPuPpfV/4KgK3maLZwcMkXPxm9tn:o0nTv2fnuRfVQLKWaOcD8tn
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/2200-2-0x0000000000400000-0x0000000000500000-memory.dmp modiloader_stage2 behavioral1/memory/2516-15-0x0000000000400000-0x0000000000500000-memory.dmp modiloader_stage2 behavioral1/memory/2200-20-0x0000000000400000-0x0000000000500000-memory.dmp modiloader_stage2 behavioral1/memory/2516-21-0x0000000000400000-0x0000000000500000-memory.dmp modiloader_stage2 behavioral1/memory/2200-29-0x0000000000400000-0x0000000000500000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 NetSys.exe -
Loads dropped DLL 5 IoCs
pid Process 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 2000 WerFault.exe 2000 WerFault.exe 2000 WerFault.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\NetSys.exe ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\NetSys.exe ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2000 2516 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NetSys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2516 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2516 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2516 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 30 PID 2200 wrote to memory of 2516 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2000 2516 NetSys.exe 31 PID 2516 wrote to memory of 2000 2516 NetSys.exe 31 PID 2516 wrote to memory of 2000 2516 NetSys.exe 31 PID 2516 wrote to memory of 2000 2516 NetSys.exe 31 PID 2200 wrote to memory of 2748 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 33 PID 2200 wrote to memory of 2748 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 33 PID 2200 wrote to memory of 2748 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 33 PID 2200 wrote to memory of 2748 2200 ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed0133ad9f3b391808812eba802cbfda_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\NetSys.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\NetSys.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 2843⤵
- Loads dropped DLL
- Program crash
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c88d8af7e242440b00810645c0fda1e0
SHA13908431b0e17848d0ad4ea37ebb7a9c6fce499fc
SHA256d6330deda55185ba9830f914859174af7659c4ed2827057de6549bd5ca2726ab
SHA5120e1ee43b4e17c1a14d1a99af4e7b9b0a7c7b246387d6ec56c4f55d75da6a7eda5fe78fcbb642167a2a36838b8d90906d898e609b274343f221069167b892bb30
-
Filesize
262KB
MD5ed0133ad9f3b391808812eba802cbfda
SHA1147295047fe53facf4376fccd8c63322bd2a609d
SHA2566e62ee6efbbc28df21db6a3ce1504a54f5d25dc7f948e209aa3c43f58b884989
SHA51209e47d4c9c3f64c483812aa3bad96528b602fa1e82c1483e4d35135daaac8d15a680bb7ae96b0f2ec62367df5bbdabab3207a653f2e44b50f8e8afdd74ba2377