Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe
-
Size
774KB
-
MD5
ffa27ed5781c3830aa6c54e94c042571
-
SHA1
c64c0a68900e9e7eeff9e39148a9c20bbdf7c98a
-
SHA256
d5abac29597706744265cbbcb6f0bef3d286789d8fb0839b9d7f2eeb08da5e91
-
SHA512
a87385f2bdcc76a64cd760e32878bec133377f4fea016c1462728ff045a4178efe099e7efde1939a8624c1bf76a906ac85639540ca7533ee5535be3f73a30b0f
-
SSDEEP
12288:KifzDQZpKIZSgJPqa/NA6zD5+bO2eJpTx8fbkP04SrLKDF3Z4mxxjBOL9h+r93K6:eZpKGialAUDz7VodjX8QmXjukr9cf6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2040-39-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 behavioral1/memory/2732-62-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 behavioral1/memory/2040-74-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2260 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 rejoice47.exe -
Loads dropped DLL 5 IoCs
pid Process 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 2560 WerFault.exe 2560 WerFault.exe 2560 WerFault.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\U: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\V: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\A: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\G: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\I: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\Q: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\R: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\W: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\Y: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\J: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\M: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\S: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\P: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\X: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\Z: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\B: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\E: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\L: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\N: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\O: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\H: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened (read-only) \??\K: ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AutoRun.inf ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened for modification C:\AutoRun.inf ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File created F:\AutoRun.inf ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened for modification F:\AutoRun.inf ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 1724 2732 rejoice47.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2560 2732 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2732 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 30 PID 2040 wrote to memory of 2732 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 30 PID 2040 wrote to memory of 2732 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 30 PID 2040 wrote to memory of 2732 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 30 PID 2732 wrote to memory of 1724 2732 rejoice47.exe 31 PID 2732 wrote to memory of 1724 2732 rejoice47.exe 31 PID 2732 wrote to memory of 1724 2732 rejoice47.exe 31 PID 2732 wrote to memory of 1724 2732 rejoice47.exe 31 PID 2732 wrote to memory of 1724 2732 rejoice47.exe 31 PID 2732 wrote to memory of 1724 2732 rejoice47.exe 31 PID 2732 wrote to memory of 2560 2732 rejoice47.exe 32 PID 2732 wrote to memory of 2560 2732 rejoice47.exe 32 PID 2732 wrote to memory of 2560 2732 rejoice47.exe 32 PID 2732 wrote to memory of 2560 2732 rejoice47.exe 32 PID 2040 wrote to memory of 2260 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 33 PID 2040 wrote to memory of 2260 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 33 PID 2040 wrote to memory of 2260 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 33 PID 2040 wrote to memory of 2260 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 33 PID 2040 wrote to memory of 2260 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 33 PID 2040 wrote to memory of 2260 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 33 PID 2040 wrote to memory of 2260 2040 ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffa27ed5781c3830aa6c54e94c042571_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3203⤵
- Loads dropped DLL
- Program crash
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD57f33e657405e480be781488fc9afb6e8
SHA1505e800237c9381df73a2d1f5b20d2f4d5403658
SHA2564a3325be21007e9c4cf83091a47cf95bef1d47a3e8d6c2a577112c4e39e51873
SHA512b59d253e37ff1afbb33f05473ef6e74de3608271fa31c323e12ce5ad7d6b83813d8a72ea5aae7dec4d8c13b47d468cbbcf0adebe9c17d24fbc6c324fd067bcfc
-
Filesize
774KB
MD5ffa27ed5781c3830aa6c54e94c042571
SHA1c64c0a68900e9e7eeff9e39148a9c20bbdf7c98a
SHA256d5abac29597706744265cbbcb6f0bef3d286789d8fb0839b9d7f2eeb08da5e91
SHA512a87385f2bdcc76a64cd760e32878bec133377f4fea016c1462728ff045a4178efe099e7efde1939a8624c1bf76a906ac85639540ca7533ee5535be3f73a30b0f