Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe
-
Size
690KB
-
MD5
f63d8b4899a29783bb21dc0f89569ba2
-
SHA1
5b2da4c489c9b0bde7e8cd640ec39b1de0bc0946
-
SHA256
00dc4a8ee72a27ff8ee5f510095ea7713596771f5240230000306a281c44ddf2
-
SHA512
5a1052a9662c98f4f5c2feaf5fb669a014464f6decd440a258bd5acd14923497abac8a7918c4c1566f1b3cea497b1398affded96be3f6492cd1bb8720e252e58
-
SSDEEP
12288:3x/RhJyiboPXKW7+UacNZdUwu19Vf8bF3Z4mxxdUT1Xou0gQpzHzIIY6sqciFp7:3hr8i7W7+u+j1TfsQmXOxXo5zpio7
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral2/memory/4848-44-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral2/memory/4248-48-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral2/memory/4248-53-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral2/memory/4248-58-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral2/memory/4248-67-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 behavioral2/memory/4248-82-0x0000000000400000-0x0000000000521000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4248 office -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\O: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\A: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\E: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\H: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\K: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\Z: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\B: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\I: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\J: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\U: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\Q: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\R: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\V: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\W: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\G: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\L: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\N: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\P: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\X: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\S: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\T: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened (read-only) \??\Y: f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\AutoRun.inf f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File created C:\AutoRun.inf f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened for modification C:\AutoRun.inf f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File created F:\AutoRun.inf f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_office office File opened for modification C:\Windows\SysWOW64\_office office -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 4248 set thread context of 2368 4248 office 83 PID 4248 set thread context of 3236 4248 office 94 PID 4248 set thread context of 2096 4248 office 99 PID 4248 set thread context of 3016 4248 office 103 PID 4248 set thread context of 3880 4248 office 108 PID 4248 set thread context of 3228 4248 office 111 PID 4248 set thread context of 1648 4248 office 114 PID 4248 set thread context of 2992 4248 office 117 PID 4248 set thread context of 4824 4248 office 120 PID 4248 set thread context of 784 4248 office 123 PID 4248 set thread context of 3580 4248 office 126 PID 4248 set thread context of 2636 4248 office 131 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\office f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\office f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe -
Program crash 12 IoCs
pid pid_target Process procid_target 208 2368 WerFault.exe 83 3256 3236 WerFault.exe 94 1068 2096 WerFault.exe 99 8 3016 WerFault.exe 103 4656 3880 WerFault.exe 108 4308 3228 WerFault.exe 111 5016 1648 WerFault.exe 114 4516 2992 WerFault.exe 117 3388 4824 WerFault.exe 120 2304 784 WerFault.exe 123 1952 3580 WerFault.exe 126 3396 2636 WerFault.exe 131 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language office Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4248 4848 f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe 82 PID 4848 wrote to memory of 4248 4848 f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe 82 PID 4848 wrote to memory of 4248 4848 f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe 82 PID 4248 wrote to memory of 2368 4248 office 83 PID 4248 wrote to memory of 2368 4248 office 83 PID 4248 wrote to memory of 2368 4248 office 83 PID 4248 wrote to memory of 2368 4248 office 83 PID 4248 wrote to memory of 2368 4248 office 83 PID 4848 wrote to memory of 3952 4848 f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe 85 PID 4848 wrote to memory of 3952 4848 f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe 85 PID 4848 wrote to memory of 3952 4848 f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe 85 PID 4248 wrote to memory of 3236 4248 office 94 PID 4248 wrote to memory of 3236 4248 office 94 PID 4248 wrote to memory of 3236 4248 office 94 PID 4248 wrote to memory of 3236 4248 office 94 PID 4248 wrote to memory of 3236 4248 office 94 PID 4248 wrote to memory of 2096 4248 office 99 PID 4248 wrote to memory of 2096 4248 office 99 PID 4248 wrote to memory of 2096 4248 office 99 PID 4248 wrote to memory of 2096 4248 office 99 PID 4248 wrote to memory of 2096 4248 office 99 PID 4248 wrote to memory of 3016 4248 office 103 PID 4248 wrote to memory of 3016 4248 office 103 PID 4248 wrote to memory of 3016 4248 office 103 PID 4248 wrote to memory of 3016 4248 office 103 PID 4248 wrote to memory of 3016 4248 office 103 PID 4248 wrote to memory of 3276 4248 office 107 PID 4248 wrote to memory of 3276 4248 office 107 PID 4248 wrote to memory of 3276 4248 office 107 PID 4248 wrote to memory of 3880 4248 office 108 PID 4248 wrote to memory of 3880 4248 office 108 PID 4248 wrote to memory of 3880 4248 office 108 PID 4248 wrote to memory of 3880 4248 office 108 PID 4248 wrote to memory of 3880 4248 office 108 PID 4248 wrote to memory of 3228 4248 office 111 PID 4248 wrote to memory of 3228 4248 office 111 PID 4248 wrote to memory of 3228 4248 office 111 PID 4248 wrote to memory of 3228 4248 office 111 PID 4248 wrote to memory of 3228 4248 office 111 PID 4248 wrote to memory of 1648 4248 office 114 PID 4248 wrote to memory of 1648 4248 office 114 PID 4248 wrote to memory of 1648 4248 office 114 PID 4248 wrote to memory of 1648 4248 office 114 PID 4248 wrote to memory of 1648 4248 office 114 PID 4248 wrote to memory of 2992 4248 office 117 PID 4248 wrote to memory of 2992 4248 office 117 PID 4248 wrote to memory of 2992 4248 office 117 PID 4248 wrote to memory of 2992 4248 office 117 PID 4248 wrote to memory of 2992 4248 office 117 PID 4248 wrote to memory of 4824 4248 office 120 PID 4248 wrote to memory of 4824 4248 office 120 PID 4248 wrote to memory of 4824 4248 office 120 PID 4248 wrote to memory of 4824 4248 office 120 PID 4248 wrote to memory of 4824 4248 office 120 PID 4248 wrote to memory of 784 4248 office 123 PID 4248 wrote to memory of 784 4248 office 123 PID 4248 wrote to memory of 784 4248 office 123 PID 4248 wrote to memory of 784 4248 office 123 PID 4248 wrote to memory of 784 4248 office 123 PID 4248 wrote to memory of 3580 4248 office 126 PID 4248 wrote to memory of 3580 4248 office 126 PID 4248 wrote to memory of 3580 4248 office 126 PID 4248 wrote to memory of 3580 4248 office 126 PID 4248 wrote to memory of 3580 4248 office 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f63d8b4899a29783bb21dc0f89569ba2_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\office"C:\Program Files\Common Files\Microsoft Shared\MSINFO\office"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 124⤵
- Program crash
PID:208
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 124⤵
- Program crash
PID:3256
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 124⤵
- Program crash
PID:1068
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 124⤵
- Program crash
PID:8
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3276
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 124⤵
- Program crash
PID:4656
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 124⤵
- Program crash
PID:4308
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 124⤵
- Program crash
PID:5016
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 124⤵
- Program crash
PID:4516
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 124⤵
- Program crash
PID:3388
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 124⤵
- Program crash
PID:2304
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 124⤵
- Program crash
PID:1952
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4952
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2172
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 124⤵
- Program crash
PID:3396
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""2⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2368 -ip 23681⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3236 -ip 32361⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2096 -ip 20961⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3016 -ip 30161⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3880 -ip 38801⤵PID:1212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3228 -ip 32281⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1648 -ip 16481⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2992 -ip 29921⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4824 -ip 48241⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 784 -ip 7841⤵PID:2652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3580 -ip 35801⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2636 -ip 26361⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5e1810a20884395cea27169bf7b2ad7f6
SHA101e9d9732b14bee2581a97cbe13ab2ce83676553
SHA256a7fdd5678c9638c493c8297152ed9809db96cc1b9136f1e3b854e846b1f4028a
SHA5122bc99258f820a797b0cbc0ad34ca46fe71cbbb38337726b5f6e3a1c7f7e31e8cec4d1df451ef76d632178650ed8e0d31646edb2da0c2a25a3d31999c89183619
-
Filesize
690KB
MD5f63d8b4899a29783bb21dc0f89569ba2
SHA15b2da4c489c9b0bde7e8cd640ec39b1de0bc0946
SHA25600dc4a8ee72a27ff8ee5f510095ea7713596771f5240230000306a281c44ddf2
SHA5125a1052a9662c98f4f5c2feaf5fb669a014464f6decd440a258bd5acd14923497abac8a7918c4c1566f1b3cea497b1398affded96be3f6492cd1bb8720e252e58