Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe
-
Size
283KB
-
MD5
f1edceefcca98a261f40e21e3647a467
-
SHA1
4a202be8411945787223ae920cee1acf4326011f
-
SHA256
d55ed55bcda63c78b01ebdf316460be604561b385ff48838069ff639529cdf4a
-
SHA512
4445cbf56dde26475af4ebb0be6cc70c040cd82ea4a21d6ce756c58bd112dcf3d5a9213292f549631f155ecb3c8b23142128d9ff8fa0624540a16996360556d6
-
SSDEEP
6144:YgH5Pxlx/b2zcVGK27wz17bmyH4ULnXAQbI6HUgdx+sAzo0IbmBiQix60r:Yk5P1bwcWobmjSXo60Ldot+irr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral1/memory/2060-5-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral1/memory/2060-18-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral1/memory/2060-13-0x00000000022C0000-0x000000000240E000-memory.dmp modiloader_stage2 behavioral1/memory/1640-22-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral1/memory/1640-35-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral1/memory/2060-43-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1640 qq0.exe -
Loads dropped DLL 5 IoCs
pid Process 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 2140 WerFault.exe 2140 WerFault.exe 2140 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_qq0.exe qq0.exe File opened for modification C:\Windows\SysWOW64\_qq0.exe qq0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1640 set thread context of 2392 1640 qq0.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2140 1640 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qq0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 30 PID 2060 wrote to memory of 1640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 30 PID 1640 wrote to memory of 2392 1640 qq0.exe 31 PID 1640 wrote to memory of 2392 1640 qq0.exe 31 PID 1640 wrote to memory of 2392 1640 qq0.exe 31 PID 1640 wrote to memory of 2392 1640 qq0.exe 31 PID 1640 wrote to memory of 2392 1640 qq0.exe 31 PID 1640 wrote to memory of 2392 1640 qq0.exe 31 PID 1640 wrote to memory of 2140 1640 qq0.exe 32 PID 1640 wrote to memory of 2140 1640 qq0.exe 32 PID 1640 wrote to memory of 2140 1640 qq0.exe 32 PID 1640 wrote to memory of 2140 1640 qq0.exe 32 PID 2060 wrote to memory of 2640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 34 PID 2060 wrote to memory of 2640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 34 PID 2060 wrote to memory of 2640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 34 PID 2060 wrote to memory of 2640 2060 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:2140
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c4e4b108c3364d727da2b40ff215b7ad
SHA152dc29e9bac78559c78b01f0a4065c00f4d27209
SHA2562eef5a55317bdcf0d03dfb4523dcdda4e2966707801ae22c5620b3603ab2fd6a
SHA51293fdba02e074d7dff1b6f802fe90178b9b1eb577d2fbc5317b3b2f83dd00cf2fa01e7e1e42ef39f8b94dfe43bb7d070115fccc8856fff5d9d4bddd90e8a2218d
-
Filesize
283KB
MD5f1edceefcca98a261f40e21e3647a467
SHA14a202be8411945787223ae920cee1acf4326011f
SHA256d55ed55bcda63c78b01ebdf316460be604561b385ff48838069ff639529cdf4a
SHA5124445cbf56dde26475af4ebb0be6cc70c040cd82ea4a21d6ce756c58bd112dcf3d5a9213292f549631f155ecb3c8b23142128d9ff8fa0624540a16996360556d6