Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe
-
Size
380KB
-
MD5
f70c81a378dc5355e4590085981bf11f
-
SHA1
daedd655703e8c695481c83c899d253479214998
-
SHA256
7f1395015e1cae98414ddd196ff09152a8347adbd27f279dbb618bd48da7f9a7
-
SHA512
e3e2743b174f2cffdd4801ce478b105fe5d69bb6839974df6992a14a829dac289695a2da50e55e0c04429349dd0fdb547f893abbf9ece5aaf00d0364e74164b2
-
SSDEEP
6144:/ELMqcWOZNmWBrZ7sKhqXZLoUo9ynLhziBfRJmdw877kIxpO9v7PhkNxWL10TOv0:rWOvJBN7sKhqxIkn9WB3mdw877pO9vGB
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral1/memory/2320-5-0x0000000000400000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2420-16-0x0000000000400000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2420-17-0x0000000000400000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2320-21-0x0000000000400000-0x000000000053C000-memory.dmp modiloader_stage2 behavioral1/memory/2320-23-0x0000000003130000-0x000000000326C000-memory.dmp modiloader_stage2 behavioral1/memory/2320-31-0x0000000000400000-0x000000000053C000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2508 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 rejoice47.exe -
Loads dropped DLL 5 IoCs
pid Process 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1624 2420 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2420 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2420 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2420 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 28 PID 2320 wrote to memory of 2420 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 28 PID 2420 wrote to memory of 1624 2420 rejoice47.exe 29 PID 2420 wrote to memory of 1624 2420 rejoice47.exe 29 PID 2420 wrote to memory of 1624 2420 rejoice47.exe 29 PID 2420 wrote to memory of 1624 2420 rejoice47.exe 29 PID 2320 wrote to memory of 2508 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2508 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2508 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2508 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2508 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2508 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 32 PID 2320 wrote to memory of 2508 2320 f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f70c81a378dc5355e4590085981bf11f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2843⤵
- Loads dropped DLL
- Program crash
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD567a8c73667e30284ece44d56c934a277
SHA100e52e3884ed63bcf0e505657d0daa9d8420da8b
SHA256dd11dfb41646143d4ed639fbd345538cefcf6955263ddc859b59a10ef17f8a29
SHA5123f90e57c24ad94ae9204650253a315592a5b16c20b47076a20345685d24e52085ed4eaebd7088d486d20a079d4fd0d4a01b1332bdf71b64d61ef60698ea93fc1
-
Filesize
380KB
MD5f70c81a378dc5355e4590085981bf11f
SHA1daedd655703e8c695481c83c899d253479214998
SHA2567f1395015e1cae98414ddd196ff09152a8347adbd27f279dbb618bd48da7f9a7
SHA512e3e2743b174f2cffdd4801ce478b105fe5d69bb6839974df6992a14a829dac289695a2da50e55e0c04429349dd0fdb547f893abbf9ece5aaf00d0364e74164b2