Analysis
-
max time kernel
112s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe
-
Size
213KB
-
MD5
ee64ef4352c48c62fff1f2eaa569c088
-
SHA1
e541f4056451318292df0a975f98e129e78fbd7b
-
SHA256
2c8ab9a3a01f8daf7ab202a00ca015230ef5c500c1f12edd19f5d47426b5b263
-
SHA512
b96481225bdc98e0d15806b476101fb46507ce7999711e8478362c1e43c5f37e0e19eddd052974c57a640d2d1e48b8fb9f9c7520d0d40ee8f67c1c8c56ff78e2
-
SSDEEP
3072:ymlRNnU+CsIcetvEe6pz9gaPD7nGcaoOj6gYxQ8I8Cue4/IjFKxpILA3ViMYA:vU+CsIcetvr8zaa7icaonguQ8G4da8R
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2532-18-0x0000000000400000-0x00000000004C9000-memory.dmp modiloader_stage2 behavioral1/memory/2564-25-0x0000000000400000-0x00000000004C9000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1460 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2532 scvhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\scvhost.exe ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\Deleteme.bat ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2532 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2532 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2532 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2532 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 29 PID 2564 wrote to memory of 1460 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 30 PID 2564 wrote to memory of 1460 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 30 PID 2564 wrote to memory of 1460 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 30 PID 2564 wrote to memory of 1460 2564 ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee64ef4352c48c62fff1f2eaa569c088_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5ca5d244f494d020998a461790cf296c5
SHA1b03ce36a4319bea833f8e3dd41b56802c7de9f79
SHA256173725d7ea5d46889700936b1c3dc81120518c43d2f49df1af184a7f14383ceb
SHA5122b8e75faa7f3c899fce067592d788c305d3453f8d3b3d87868a04b8bd40d33a62cb1944b7f36fd46c06ee68d63a6fa3e606a0c1e669a070ed9caacdce0288576
-
Filesize
213KB
MD5ee64ef4352c48c62fff1f2eaa569c088
SHA1e541f4056451318292df0a975f98e129e78fbd7b
SHA2562c8ab9a3a01f8daf7ab202a00ca015230ef5c500c1f12edd19f5d47426b5b263
SHA512b96481225bdc98e0d15806b476101fb46507ce7999711e8478362c1e43c5f37e0e19eddd052974c57a640d2d1e48b8fb9f9c7520d0d40ee8f67c1c8c56ff78e2