Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 05:09
Behavioral task
behavioral1
Sample
f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe
-
Size
264KB
-
MD5
f7a20f72594e93e888cf726e87c827f6
-
SHA1
5f917f08cd58f000c9903d6cf213ce5ea9509813
-
SHA256
abd2d026b3745d4b020ac55c1a4c3ea926c4b72c19ddb6efca48c50ac111a941
-
SHA512
da5cd6711edf0a62f680cf9cb094dd93840ea797ab16b71d4a98408e753ae107407aa2bbf913af628963b4ccff2d1ba6e7f3c5e2f7220feced13d46d7022b388
-
SSDEEP
6144:CVjiJLbA6jiuok9+hyhkMblUBj1zial2j7SxzJvwi:eQb12h2kyluiRvSxzhwi
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2368-9-0x0000000000400000-0x0000000000449000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2956 girl123.exe 2720 server.exe 1720 server.exe -
Loads dropped DLL 8 IoCs
pid Process 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 2956 girl123.exe 2956 girl123.exe 2956 girl123.exe 2720 server.exe 2720 server.exe 1720 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" girl123.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 1720 2720 server.exe 31 -
resource yara_rule behavioral1/files/0x0009000000016688-19.dat upx behavioral1/memory/2956-27-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/2720-41-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language girl123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 server.exe 1720 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 server.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2956 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2956 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2956 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2956 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2956 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2956 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 29 PID 2368 wrote to memory of 2956 2368 f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe 29 PID 2956 wrote to memory of 2720 2956 girl123.exe 30 PID 2956 wrote to memory of 2720 2956 girl123.exe 30 PID 2956 wrote to memory of 2720 2956 girl123.exe 30 PID 2956 wrote to memory of 2720 2956 girl123.exe 30 PID 2956 wrote to memory of 2720 2956 girl123.exe 30 PID 2956 wrote to memory of 2720 2956 girl123.exe 30 PID 2956 wrote to memory of 2720 2956 girl123.exe 30 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 2720 wrote to memory of 1720 2720 server.exe 31 PID 1720 wrote to memory of 1404 1720 server.exe 20 PID 1720 wrote to memory of 1404 1720 server.exe 20 PID 1720 wrote to memory of 1404 1720 server.exe 20 PID 1720 wrote to memory of 1404 1720 server.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7a20f72594e93e888cf726e87c827f6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\girl123.exe"C:\Users\Admin\AppData\Local\Temp\girl123.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5076745fadd0b7dc4a8906c2c2cff1dc0
SHA1cde3c5e53a3507b3db0cd4421fc604d02b26043d
SHA25695fcbc874853c171353fde26213bb7c0f7442429a870f7a002663c7c526de9ec
SHA512d9734fb7c7d5505435bb6b320429970bbf0384b5366ed7764c237062751c738cb3828821cf1d743415855ed4dc45adb01e720c78f1a7cde062d81311e9294c36
-
Filesize
252KB
MD5969cbe4eed6dc4f0d1416e0e2e051b12
SHA1e0a47ace284761d6a94a8c0ccd4db4ab5003920f
SHA256d48e75fe3d73a683c588b2950fa6a70b3530324778ed66bb6eb919aa494652b8
SHA5120a7be0375e9b8619606505f1ea993c291dedc03c2620d20caea58e6d411cff69c7c8497c0326c8f415b24de3516b65a8269126852cdd2c6db1654458e2938787