Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe
-
Size
540KB
-
MD5
edfe9a6b0a02570d8696e3df64589ed7
-
SHA1
6a4c1244019d3fd49a14b38d016c8b8773424a7f
-
SHA256
d0600a27be2d018bd6b92c965636111f2c0e53dcc42d4a698e794b74a1a51b55
-
SHA512
90325d9e80f08f2059c1e4cb529867c42034bdf3612eda3ca4d314d6c53b61fa8da12ae8d2fee2b1038cc390638047a611eed8c6476ed973a02c3469b6f1ed0f
-
SSDEEP
12288:AJZUQeM0tKPfjX3c3EvvJF3Z4mxx5s5fGUiAoXr635ZLIONd1d:AoM0EPLmkvJQmXqIUiAoXr637LIod1d
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1248-39-0x0000000000400000-0x00000000004E4000-memory.dmp modiloader_stage2 behavioral1/memory/540-41-0x0000000000400000-0x00000000004E4000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1248 ddos2.exe -
Loads dropped DLL 2 IoCs
pid Process 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ddos2.exe edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ddos2.exe ddos2.exe File created C:\Windows\SysWOW64\Deleteme.bat edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe File created C:\Windows\SysWOW64\ddos2.exe edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddos2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 540 wrote to memory of 1248 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 31 PID 540 wrote to memory of 1248 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 31 PID 540 wrote to memory of 1248 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 31 PID 540 wrote to memory of 1248 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 31 PID 540 wrote to memory of 2668 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 32 PID 540 wrote to memory of 2668 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 32 PID 540 wrote to memory of 2668 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 32 PID 540 wrote to memory of 2668 540 edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\ddos2.exeC:\Windows\system32\ddos2.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD52e530892fc270eaa67cf9c79f4ec7569
SHA1632020593924d0fbde3f03183bce04c589b4d68b
SHA2569b50a328546e79410515a703fc9fb727568c6ddb6003cc443571c69ace69d018
SHA5120a0886f08067cb1360cd6a013ddddad5aeaee357c8a1abd590a8ec7322ce675bebb8701737bc3419817226f687fc92978c5c7be17f2989c2bf78f7cb24e49d27
-
Filesize
540KB
MD5edfe9a6b0a02570d8696e3df64589ed7
SHA16a4c1244019d3fd49a14b38d016c8b8773424a7f
SHA256d0600a27be2d018bd6b92c965636111f2c0e53dcc42d4a698e794b74a1a51b55
SHA51290325d9e80f08f2059c1e4cb529867c42034bdf3612eda3ca4d314d6c53b61fa8da12ae8d2fee2b1038cc390638047a611eed8c6476ed973a02c3469b6f1ed0f