Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe
-
Size
686KB
-
MD5
fb7c8bf9f39db1d6dfcb83e965b7171a
-
SHA1
eede193002b6624ee194675c79adb84cf2293c51
-
SHA256
30ef898e25f8c0ad57894203a8298d143169ae6535b770af2ade724dd662a436
-
SHA512
e72c51706a1b648b5507778430821100ceccddc584007d85f887b408ecc5da7e203626e7d850c6d535ab5348bb1ef81c271226c41b0d7d88f64317f4585d1ae1
-
SSDEEP
12288:PGizviX0cjyOK/tSGJkGat0aiYtFwloF3Z4mxxkDqVTVOCQO:PXiJh/G5aiYtFwloQmXTVTzQO
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016652-54.dat modiloader_stage2 behavioral1/memory/2824-67-0x0000000000400000-0x00000000004C7000-memory.dmp modiloader_stage2 behavioral1/memory/2776-66-0x0000000000400000-0x00000000004C7000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2824 4.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 2380 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\paramstr.txt 4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 2776 2824 4.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2824 2380 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2824 2380 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2824 2380 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2824 2380 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2776 2824 4.exe 31 PID 2824 wrote to memory of 2776 2824 4.exe 31 PID 2824 wrote to memory of 2776 2824 4.exe 31 PID 2824 wrote to memory of 2776 2824 4.exe 31 PID 2824 wrote to memory of 2776 2824 4.exe 31 PID 2824 wrote to memory of 2776 2824 4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD5413bd7fde2090977efc26056674ed865
SHA1f0c379951a05c8275c7a67659ac325cf9f9f8099
SHA2568fa626daa095c65eecaeed9d87a98ec0aa0a0ed6e7810750ed6220d82ab1f301
SHA5126ce2eee1437a92a0d3a162d832e13586b4b4bcc130c76e64e79b633ac2e27d277c780bd2952e72b45a91ea37382de864e2cdc833042c2e3ac481e694351df33d