Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe
-
Size
668KB
-
MD5
f4a4015a7963b3aaa689ea934f36d07a
-
SHA1
8e494a2e6330f818296bcb0d7fb440ae21057d9d
-
SHA256
59b313776a1f057f3e0c0629de9360da6485684515f50eb92c0293d91757296e
-
SHA512
8dc8aceeafec7f443f56e56ca9473be208eb33faecb1da2c1805ef38617536b0d760d394079d3838a2fd08466fc6bc8e80b6ca9c08c11899bf80e0199af00345
-
SSDEEP
12288:BekY4Sa/YUTEkexQJaoaRCRRsNYYlAoCVUF3Z4mxxm0MHoTAFb7cC:U7w/BQcZlRRsNYuAXUQmXmKGB
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2828-58-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2828 2.exe -
Loads dropped DLL 2 IoCs
pid Process 2528 f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe 2528 f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Fiele Ps.txt 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2828 2528 f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2828 2528 f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2828 2528 f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2828 2528 f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe 30 PID 2828 wrote to memory of 2980 2828 2.exe 31 PID 2828 wrote to memory of 2980 2828 2.exe 31 PID 2828 wrote to memory of 2980 2828 2.exe 31 PID 2828 wrote to memory of 2980 2828 2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4a4015a7963b3aaa689ea934f36d07a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD5d8b6dfdecacd262ed1b343f623c87958
SHA1fcb58decbc46da957053fb84f212eff50a9bec90
SHA256f750e2cd4f1f7eb879ace7cd351621d26c6822745c56c538ec09545487997b25
SHA5126b8429ca6cde2db31328114c8192c433206c22b57c8bb29d9661eafc481242cb4478d4934a84316dad980c20f40888412e7014f72accef90f845073d69863742