Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe
-
Size
389KB
-
MD5
f0b51b01a8bb25cfc0be4cc53adff0d4
-
SHA1
8a37ff06e4f1daf98ef706ddd69907c292778bb9
-
SHA256
642a7c7e0ab17ea171af6cea6818c5206f068ca30407af786c05ffddaa1df664
-
SHA512
f32b25708cd633a670fb333b7ce60fc08580641e8ba6d6065edca8dd773801e30b57d9be497e64d58a93b560a01c6b52611fd4cc3f4106f0499fe29d9962418b
-
SSDEEP
12288:PKn08OYFPmp9WmtCv3bsz3DSiBBa1k6Z:PK081Vesmov3gz3DSSBMZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/1868-5-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/2084-15-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/2084-13-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/2084-16-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/1868-17-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/2084-19-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/1868-27-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1632 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 re91.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\ReDelBat.bat f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe File created C:\Windows\re91.exe f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe File opened for modification C:\Windows\re91.exe f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2480 2084 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language re91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2084 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2084 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2084 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2084 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 30 PID 2084 wrote to memory of 2480 2084 re91.exe 31 PID 2084 wrote to memory of 2480 2084 re91.exe 31 PID 2084 wrote to memory of 2480 2084 re91.exe 31 PID 2084 wrote to memory of 2480 2084 re91.exe 31 PID 1868 wrote to memory of 1632 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 33 PID 1868 wrote to memory of 1632 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 33 PID 1868 wrote to memory of 1632 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 33 PID 1868 wrote to memory of 1632 1868 f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0b51b01a8bb25cfc0be4cc53adff0d4_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\re91.exeC:\Windows\re91.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 2843⤵
- Program crash
PID:2480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ReDelBat.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD58c3ed75cbca057d0b1fc383be3dfc937
SHA13cc85fc59aca4acaf7ea5a87555662286bdb43c2
SHA25684f746919b13b0d5ce190ccc9d8ad9b5a6f5bad4d5dd690b4fcf235a21ea29ad
SHA5126c1132a48da16d292831b3d9420bb79010a34d71e0cc3ced232e11ede281d17dd55c30c6b6dbdf7c9f8548664f349a8db2d414cc654449d7c7a66eefa0075106
-
Filesize
389KB
MD5f0b51b01a8bb25cfc0be4cc53adff0d4
SHA18a37ff06e4f1daf98ef706ddd69907c292778bb9
SHA256642a7c7e0ab17ea171af6cea6818c5206f068ca30407af786c05ffddaa1df664
SHA512f32b25708cd633a670fb333b7ce60fc08580641e8ba6d6065edca8dd773801e30b57d9be497e64d58a93b560a01c6b52611fd4cc3f4106f0499fe29d9962418b