Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 15:41
Behavioral task
behavioral1
Sample
f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe
-
Size
232KB
-
MD5
f250a56d62a76d9f243c670b72fd83f5
-
SHA1
16436fb987d22183561124506f7095d4d3ce69c2
-
SHA256
cf92cfd602320ff3b436085f513bf3e5ed9cabda7f3a9532f60e88660a547f20
-
SHA512
8c3d5c17a659043a9f21b06a1572e2ee317b8c11a488cba1617c8766c62661d3663eed61d9c592af1a74d280baad4cb862d8b8f3a773c3de43fdc30f2edb4d8d
-
SSDEEP
6144:V7F5YVIM7MaJc6mWRHH+o1SiTTuiO++vyX:V707MIc67JHP1SsTue+
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2544-18-0x0000000000400000-0x0000000000441000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2892 BaDBoYv4.2.exe 1388 cut.exe 2824 cut.exe -
Loads dropped DLL 5 IoCs
pid Process 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 1388 cut.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1388 set thread context of 2824 1388 cut.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BaDBoYv4.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cut.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 cut.exe 2824 cut.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2892 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 29 PID 2544 wrote to memory of 2892 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 29 PID 2544 wrote to memory of 2892 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 29 PID 2544 wrote to memory of 2892 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 29 PID 2544 wrote to memory of 1388 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 30 PID 2544 wrote to memory of 1388 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 30 PID 2544 wrote to memory of 1388 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 30 PID 2544 wrote to memory of 1388 2544 f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe 30 PID 1388 wrote to memory of 2824 1388 cut.exe 31 PID 1388 wrote to memory of 2824 1388 cut.exe 31 PID 1388 wrote to memory of 2824 1388 cut.exe 31 PID 1388 wrote to memory of 2824 1388 cut.exe 31 PID 1388 wrote to memory of 2824 1388 cut.exe 31 PID 1388 wrote to memory of 2824 1388 cut.exe 31 PID 1388 wrote to memory of 2824 1388 cut.exe 31 PID 2824 wrote to memory of 1212 2824 cut.exe 20 PID 2824 wrote to memory of 1212 2824 cut.exe 20 PID 2824 wrote to memory of 1212 2824 cut.exe 20 PID 2824 wrote to memory of 1212 2824 cut.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f250a56d62a76d9f243c670b72fd83f5_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\BaDBoYv4.2.exe"C:\Users\Admin\AppData\Local\Temp\BaDBoYv4.2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\cut.exe"C:\Users\Admin\AppData\Local\Temp\cut.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\cut.exe2C:\Users\Admin\AppData\Local\Temp\cut.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5d5ddb945188e6c86a65f28d76938d20e
SHA18c8dd29b9b8517eebe72d69a9964d1c2a10bcc44
SHA256225d1612a84b60c93d8309824ca62cced3ad514265e26369d24ff4fd99f0e1fe
SHA512db1fd83db80b3cf596fb9928407ec5eeeb912e63f04aa4068a1d014f8dc7192da5c3d6a315ecfa2ee2ccfe541faa91712bd7d2fd9120b8744780207fac35825d
-
Filesize
64KB
MD50b7e05b7df74505405bc108274246e82
SHA1c2919ce8ab6b46349d7605a09677b2aff1859c6e
SHA256346bb1ed97075ea5f4ed5e1ddc8332c05592b5a222178ad04d05b380eafc86d5
SHA512f5ef64a6361a06420bab3bb39b4bf62df11a13a7d5424ced02875e4e561af7894b09e822a3f31b16c53e8df32748f0baec2edb05f70ce601ee97d7352be82d04