Analysis
-
max time kernel
92s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe
-
Size
283KB
-
MD5
f1edceefcca98a261f40e21e3647a467
-
SHA1
4a202be8411945787223ae920cee1acf4326011f
-
SHA256
d55ed55bcda63c78b01ebdf316460be604561b385ff48838069ff639529cdf4a
-
SHA512
4445cbf56dde26475af4ebb0be6cc70c040cd82ea4a21d6ce756c58bd112dcf3d5a9213292f549631f155ecb3c8b23142128d9ff8fa0624540a16996360556d6
-
SSDEEP
6144:YgH5Pxlx/b2zcVGK27wz17bmyH4ULnXAQbI6HUgdx+sAzo0IbmBiQix60r:Yk5P1bwcWobmjSXo60Ldot+irr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/memory/2096-5-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral2/memory/752-11-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral2/memory/752-14-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral2/memory/752-19-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 behavioral2/memory/2096-20-0x0000000000400000-0x000000000054D4EC-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 752 qq0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_qq0.exe qq0.exe File opened for modification C:\Windows\SysWOW64\_qq0.exe qq0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 752 set thread context of 1008 752 qq0.exe 83 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2708 1008 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qq0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2096 wrote to memory of 752 2096 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 82 PID 2096 wrote to memory of 752 2096 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 82 PID 2096 wrote to memory of 752 2096 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 82 PID 752 wrote to memory of 1008 752 qq0.exe 83 PID 752 wrote to memory of 1008 752 qq0.exe 83 PID 752 wrote to memory of 1008 752 qq0.exe 83 PID 752 wrote to memory of 1008 752 qq0.exe 83 PID 752 wrote to memory of 1008 752 qq0.exe 83 PID 752 wrote to memory of 1424 752 qq0.exe 84 PID 752 wrote to memory of 1424 752 qq0.exe 84 PID 2096 wrote to memory of 3680 2096 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 86 PID 2096 wrote to memory of 3680 2096 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 86 PID 2096 wrote to memory of 3680 2096 f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1edceefcca98a261f40e21e3647a467_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\qq0.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 124⤵
- Program crash
PID:2708
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:1424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""2⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1008 -ip 10081⤵PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5c4e4b108c3364d727da2b40ff215b7ad
SHA152dc29e9bac78559c78b01f0a4065c00f4d27209
SHA2562eef5a55317bdcf0d03dfb4523dcdda4e2966707801ae22c5620b3603ab2fd6a
SHA51293fdba02e074d7dff1b6f802fe90178b9b1eb577d2fbc5317b3b2f83dd00cf2fa01e7e1e42ef39f8b94dfe43bb7d070115fccc8856fff5d9d4bddd90e8a2218d
-
Filesize
283KB
MD5f1edceefcca98a261f40e21e3647a467
SHA14a202be8411945787223ae920cee1acf4326011f
SHA256d55ed55bcda63c78b01ebdf316460be604561b385ff48838069ff639529cdf4a
SHA5124445cbf56dde26475af4ebb0be6cc70c040cd82ea4a21d6ce756c58bd112dcf3d5a9213292f549631f155ecb3c8b23142128d9ff8fa0624540a16996360556d6