Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 08:36
Behavioral task
behavioral1
Sample
fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe
-
Size
183KB
-
MD5
fa13973fbe1242a9c35c6eb29f6c451d
-
SHA1
4b2131058fee9ee5b8b362b66854ac52e34ede8c
-
SHA256
9fd2e5eb1f2bde085b8a1229a10062293bb0a9eac096f15b94401166a7995e38
-
SHA512
f3c9fe048cf535d1bbae52da5d0fbbc7c16331b3410897e4d8e024eef215f4d5da85b10c6c976594b0abf04d0325a897dbc5573d81ae745c9a79d4991e444456
-
SSDEEP
3072:mhOTFkw20+9FmwSh8HJvJkIS0KixLz6LUcMGgJzKY8n0tavrjU:X20+Hmhh8cb0vp6LYrAzdDj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2520-19-0x0000000000400000-0x0000000000435000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2160 Server.exe 2876 Server.exe -
Loads dropped DLL 3 IoCs
pid Process 2520 fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe 2520 fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe 2160 Server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 2876 2160 Server.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1812 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2160 2520 fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2160 2520 fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2876 2160 Server.exe 31 PID 2160 wrote to memory of 2876 2160 Server.exe 31 PID 2160 wrote to memory of 2876 2160 Server.exe 31 PID 2160 wrote to memory of 2876 2160 Server.exe 31 PID 2160 wrote to memory of 2876 2160 Server.exe 31 PID 2160 wrote to memory of 2876 2160 Server.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa13973fbe1242a9c35c6eb29f6c451d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Server.exeC:\Users\Admin\AppData\Local\Temp\Server.exe3⤵
- Executes dropped EXE
PID:2876
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD56c7afbaac87343a95f25211e0e925599
SHA176a5a08432c4160b5e40f753b5626299a3d4dbf1
SHA256f0ae40e8f4936fbeb0ead8fb794817434f5d6e642d17e4d3bd9b004ca388e4ad
SHA51217ef5c9d06caa91f70bf09cd73c4e07a97f891f1afa6ecaa9a27c5a2f917e58fd7673ede00657e830154e5a8914612863c5164f46cc0e2bad6a4960cfcf0f039
-
Filesize
61KB
MD54322b83800b84808639e205c0b28f8b1
SHA1bca88869c00fcc72b545453c03f110357b539f10
SHA256897d010ae0336c60bab676b749c8e885df169f9597f9165049b9e716dd261675
SHA51252e54315fc5b60ce14b16253e00a50c73a2af64cc5180de0fc0c5d916bb5d8b3af9b3bc5f067e7387bd069d46c23123c302ba020331d7d56847e158b37d688dc