Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe
-
Size
686KB
-
MD5
fb7c8bf9f39db1d6dfcb83e965b7171a
-
SHA1
eede193002b6624ee194675c79adb84cf2293c51
-
SHA256
30ef898e25f8c0ad57894203a8298d143169ae6535b770af2ade724dd662a436
-
SHA512
e72c51706a1b648b5507778430821100ceccddc584007d85f887b408ecc5da7e203626e7d850c6d535ab5348bb1ef81c271226c41b0d7d88f64317f4585d1ae1
-
SSDEEP
12288:PGizviX0cjyOK/tSGJkGat0aiYtFwloF3Z4mxxkDqVTVOCQO:PXiJh/G5aiYtFwloQmXTVTzQO
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023482-83.dat modiloader_stage2 behavioral2/memory/3056-86-0x00000000006A0000-0x0000000000767000-memory.dmp modiloader_stage2 behavioral2/memory/1488-87-0x0000000000400000-0x00000000004C7000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1488 4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\paramstr.txt 4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 3056 1488 4.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3040 3056 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1060 wrote to memory of 1488 1060 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 82 PID 1060 wrote to memory of 1488 1060 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 82 PID 1060 wrote to memory of 1488 1060 fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe 82 PID 1488 wrote to memory of 3056 1488 4.exe 83 PID 1488 wrote to memory of 3056 1488 4.exe 83 PID 1488 wrote to memory of 3056 1488 4.exe 83 PID 1488 wrote to memory of 3056 1488 4.exe 83 PID 1488 wrote to memory of 3056 1488 4.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb7c8bf9f39db1d6dfcb83e965b7171a_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:3056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 124⤵
- Program crash
PID:3040
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3056 -ip 30561⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD5413bd7fde2090977efc26056674ed865
SHA1f0c379951a05c8275c7a67659ac325cf9f9f8099
SHA2568fa626daa095c65eecaeed9d87a98ec0aa0a0ed6e7810750ed6220d82ab1f301
SHA5126ce2eee1437a92a0d3a162d832e13586b4b4bcc130c76e64e79b633ac2e27d277c780bd2952e72b45a91ea37382de864e2cdc833042c2e3ac481e694351df33d