Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 12:12
Behavioral task
behavioral1
Sample
fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe
-
Size
635KB
-
MD5
fc4561da19ce07f5a6f59f8d46882f04
-
SHA1
9472c74207ed70dd1a2c97cd0b6842eca5a1ef7f
-
SHA256
8c1145f6c139d72e7acefbe5ff699929f20a53ffd2a8fb0e8bde40023f2f22c6
-
SHA512
542843de86d506be1651330e0c63c61c67af83fc15db5d92d681ace6b182a098493aa3a0e3b89b64fa333cff190e06a8166fb5aafbff084d9a783c2ba2a94574
-
SSDEEP
12288:0m81w6smxQmUJGrUpmUCa/8CB/zmXl+FNrvxiY1w4vP9qIRukHmDvr:0m81wfmYV8YgQFJvIW9qTzP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2444-37-0x0000000000400000-0x0000000000517000-memory.dmp modiloader_stage2 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\G: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\J: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\Q: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\Z: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\H: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\L: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\Y: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\X: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\A: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\E: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\P: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\S: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\W: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\R: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\T: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\U: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\I: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\K: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\M: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\N: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\O: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened (read-only) \??\V: fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe File opened for modification F:\AutoRun.inf fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2780 2444 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2288 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2288 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2288 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2288 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2780 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 31 PID 2444 wrote to memory of 2780 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 31 PID 2444 wrote to memory of 2780 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 31 PID 2444 wrote to memory of 2780 2444 fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc4561da19ce07f5a6f59f8d46882f04_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 3122⤵
- Program crash
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD5ec717a148c0c1573ad6a89a66095c8a0
SHA12677e5c816b191a5941be928f014ec201e7de18f
SHA256d9c1af73c937692718c241a501d6213fac7803ab2f8504a845a540baf047c218
SHA5121a925338fbdbb79bb8e38064b092d5a2dbd47095751ac9e88490f255db050598f209aa97da0d8a9984e173059cb13019d2f187d0efc9777afc6fcf82fb763797