Analysis
-
max time kernel
112s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 14:04
Behavioral task
behavioral1
Sample
edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe
-
Size
20KB
-
MD5
edbfed40da9442ab67ba9e6844220f35
-
SHA1
5d9fb8a081d08b150f6e12d887fbc07af63c1981
-
SHA256
a18deb168d4be28ca55cf495163e863ea045e1d75a8ca71abdf935c01c26b776
-
SHA512
9c6b2e7382605895b383b0337f913195e19482a5359ba4da65d59fa96866edf073cf1311204cbfefc23552d0a25365bb2e9831152a6dad9bd1f3da451b9e2a14
-
SSDEEP
384:dnH9Q30L6/6F3pkBqsXK1NSLbR+1i6PHDLL9w/xPnzypQ:dnH2EL6CZa8P1QhciuH3pw/lnC
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2328-7-0x0000000013140000-0x0000000013151000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1744 cmd.exe -
resource yara_rule behavioral1/memory/2328-0-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/1480-8-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/2328-7-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/1480-4-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1480-10-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1480-12-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1480-16-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1480-24-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2328 set thread context of 1480 2328 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 29 -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2812 sc.exe 2892 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1480 2328 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 29 PID 2328 wrote to memory of 1480 2328 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 29 PID 2328 wrote to memory of 1480 2328 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 29 PID 2328 wrote to memory of 1480 2328 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 29 PID 2328 wrote to memory of 1480 2328 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 29 PID 2328 wrote to memory of 1480 2328 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 29 PID 1480 wrote to memory of 2120 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 30 PID 1480 wrote to memory of 2120 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 30 PID 1480 wrote to memory of 2120 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 30 PID 1480 wrote to memory of 2120 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 30 PID 1480 wrote to memory of 2972 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 31 PID 1480 wrote to memory of 2972 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 31 PID 1480 wrote to memory of 2972 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 31 PID 1480 wrote to memory of 2972 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 31 PID 2120 wrote to memory of 900 2120 net.exe 34 PID 2120 wrote to memory of 900 2120 net.exe 34 PID 2120 wrote to memory of 900 2120 net.exe 34 PID 2120 wrote to memory of 900 2120 net.exe 34 PID 2972 wrote to memory of 2736 2972 net.exe 35 PID 2972 wrote to memory of 2736 2972 net.exe 35 PID 2972 wrote to memory of 2736 2972 net.exe 35 PID 2972 wrote to memory of 2736 2972 net.exe 35 PID 1480 wrote to memory of 2812 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 36 PID 1480 wrote to memory of 2812 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 36 PID 1480 wrote to memory of 2812 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 36 PID 1480 wrote to memory of 2812 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 36 PID 1480 wrote to memory of 2892 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 37 PID 1480 wrote to memory of 2892 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 37 PID 1480 wrote to memory of 2892 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 37 PID 1480 wrote to memory of 2892 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 37 PID 1480 wrote to memory of 1744 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 41 PID 1480 wrote to memory of 1744 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 41 PID 1480 wrote to memory of 1744 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 41 PID 1480 wrote to memory of 1744 1480 edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:900
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\edbfed40da9442ab67ba9e6844220f35_JaffaCakes118.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3