Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe
-
Size
436KB
-
MD5
fdf6f116239d9f855afe6d8ff327400f
-
SHA1
4ae6196ba17fbbebf945e40ca07982cf426a8760
-
SHA256
d73f6fea533ee3d9fc1340d1f76251c564f86172c4128eeadcb648970ad88e7f
-
SHA512
b9d5826cb5716c8b03ece877c291a0128fba4a8beb4ed1611e506b7317008ba5aa060fa0d4ba846e9b7251478af84c35137ab0ad04cf508ec05817e3daa84b16
-
SSDEEP
6144:uFbVBjYNoo/Bwo0vEH0NMcFXO5zxg/b4sjPJpbGoSLcWKYkjIjkBgp1bzYPgTSzP:uFTzo0vEUNMcFXOM5KL+NjIIBgjk4TSj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2332-0-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 behavioral1/memory/2316-26-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 behavioral1/memory/2332-27-0x0000000000400000-0x0000000000555000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2292 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 EXPLOER.EXE -
Loads dropped DLL 2 IoCs
pid Process 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\EXPLOER.EXE fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\EXPLOER.EXE fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\EXPLOER.EXE EXPLOER.EXE File created C:\Windows\SysWOW64\ReDelBat.bat fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPLOER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2316 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 30 PID 2332 wrote to memory of 2316 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 30 PID 2332 wrote to memory of 2316 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 30 PID 2332 wrote to memory of 2316 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 30 PID 2332 wrote to memory of 2292 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2292 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2292 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2292 2332 fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\EXPLOER.EXEC:\Windows\system32\EXPLOER.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\ReDelBat.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD57317f188701802e680aa19337a7c05a7
SHA1a6bacdee671575d0391a905a874cb1d2679ae116
SHA256986c9816b569c4f00b9338852191bcd7a50868ec7b250f0420fd97dcb0158be0
SHA5124a073ad41d1a9608e2bbfc77af2d4aef14fe18b9b9250984ec75696369d819cf17b8857f442e8dc01570ee2b1862f418551f74077a373cf3b23b361ac0021e86
-
Filesize
436KB
MD5fdf6f116239d9f855afe6d8ff327400f
SHA14ae6196ba17fbbebf945e40ca07982cf426a8760
SHA256d73f6fea533ee3d9fc1340d1f76251c564f86172c4128eeadcb648970ad88e7f
SHA512b9d5826cb5716c8b03ece877c291a0128fba4a8beb4ed1611e506b7317008ba5aa060fa0d4ba846e9b7251478af84c35137ab0ad04cf508ec05817e3daa84b16