Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe
-
Size
108KB
-
MD5
f486cf57667a5744f4766845c985b27b
-
SHA1
f03354122b727edc2d9b59c8088b7ac78594f40f
-
SHA256
380cba82072d88e4ae81afaac03b8966b7ec926ec0d57efcd658e36bd89e644d
-
SHA512
df3d4f110567c6a4e511a5d9bfed696d59588fbdd69ffc2bced9782ee982ce6fff31d550540879c4aeeb92e53dcce0af8e97ebb63569b6e70fb7cb1e0d695f18
-
SSDEEP
768:pC38yHB1LhnAty+w1yV3B2xr1ux02VczZLJ7ZjhNW5OE58H6Vd2KFRhdARI3v24/:pCRHR51au8fCzD8jo88bB3EjV2lT20KP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/files/0x00070000000160a5-21.dat modiloader_stage2 behavioral1/memory/2876-28-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 behavioral1/memory/2200-27-0x0000000000400000-0x0000000000403000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2736 MSN.EXE 2876 tmp.exe 2200 tmp.exe -
Loads dropped DLL 3 IoCs
pid Process 2736 MSN.EXE 2736 MSN.EXE 2876 tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2876 set thread context of 2200 2876 tmp.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language POWERPNT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSN.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2644 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2736 MSN.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2644 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 30 PID 2632 wrote to memory of 2736 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2736 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2736 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 31 PID 2632 wrote to memory of 2736 2632 f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2876 2736 MSN.EXE 32 PID 2736 wrote to memory of 2876 2736 MSN.EXE 32 PID 2736 wrote to memory of 2876 2736 MSN.EXE 32 PID 2736 wrote to memory of 2876 2736 MSN.EXE 32 PID 2876 wrote to memory of 2200 2876 tmp.exe 33 PID 2876 wrote to memory of 2200 2876 tmp.exe 33 PID 2876 wrote to memory of 2200 2876 tmp.exe 33 PID 2876 wrote to memory of 2200 2876 tmp.exe 33 PID 2876 wrote to memory of 2200 2876 tmp.exe 33 PID 2876 wrote to memory of 2200 2876 tmp.exe 33 PID 2644 wrote to memory of 2996 2644 POWERPNT.EXE 34 PID 2644 wrote to memory of 2996 2644 POWERPNT.EXE 34 PID 2644 wrote to memory of 2996 2644 POWERPNT.EXE 34 PID 2644 wrote to memory of 2996 2644 POWERPNT.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\LLAMADAMOVISTAR.PPS"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2996
-
-
-
C:\MSN.EXE"C:\MSN.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe4⤵
- Executes dropped EXE
PID:2200
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5c1d7b47d6a04e7219dbbf4f024e07eea
SHA14e4943d54aa9d480f189f5798b85d15d9b0d4393
SHA256a8feede40fdce7fdd13e60b154fb551849627b13b22b37e331028b70750c57a9
SHA512b1eda40aaa4310e688cf227416df9793cfdf1988d2bab285f0efa752f5e941aaf6e50157c8757fb845aa0ad2fc2f7fa1cd33997cf77040fe930c0b6e2d26c289
-
Filesize
43KB
MD5333affe54f121b640c3fa188bdcc092e
SHA1e3e6d11bef382209f1cceb03affdcf73d620a020
SHA2568e8123969b416a868059ac393537ba4399fb62da8ba1de4c8a9b69ed567865a5
SHA5126b2c2ce8fcc673bf4e4b65880cbf5c6093ab9b232719900a922981d393b3c5e761b8430493751b307e5c531034a879c5f17866274b40d158247feefcbc9e3ca8
-
Filesize
19KB
MD502583fa70022a563a7673e0e92d41fea
SHA19e322541ca126ec5efbf2183b115c51c22ffd639
SHA2568ec368aa8bcd5719738e73ba0b20b88a161b2fd17f1287eb22083572311dba89
SHA512609f8021ff55a0dcc9c8a3892a31113d7eacc84f16defbb798003191b9380d4baef35b2f36d13a06bedbcad580fa5989910815d0d273101713bb0d151bbdf313