Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
06f5f623431d3515825f16ee3393b9f0
-
SHA1
45b707f82e4729083d77cadc626c03144303c3cf
-
SHA256
63e7b6d600995f6e3290f357b1741494ef805c9b1fdbec1754419ab3fd138326
-
SHA512
2d73b5ccc05289f52e8eac10fd7b338fe4c5aab78928cf92af19f11f2b55b9b27c3e4e6db8b4d647d28287fcab1e373659ddbcbcaaa64fa12f6a82f35cb5f7cc
-
SSDEEP
24576:FqQmXEzlkISmcuCym0u9s7SkKD1bRhbJysR:FLm03SFfRs7STpLTR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/files/0x0009000000016ddf-39.dat modiloader_stage2 behavioral1/memory/2516-48-0x0000000000400000-0x00000000004BE200-memory.dmp modiloader_stage2 behavioral1/memory/2516-54-0x0000000000400000-0x00000000004BE200-memory.dmp modiloader_stage2 behavioral1/memory/2516-59-0x0000000000400000-0x00000000004BE200-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2184 rundll32.exe 7 2184 rundll32.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 mm.exe -
Loads dropped DLL 3 IoCs
pid Process 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 2184 rundll32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt mm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\OOBGameInstalled = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\ServiceLocation rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2516 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2516 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2516 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2516 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2516 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2516 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2516 2092 06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2184 2516 mm.exe 31 PID 2516 wrote to memory of 2184 2516 mm.exe 31 PID 2516 wrote to memory of 2184 2516 mm.exe 31 PID 2516 wrote to memory of 2184 2516 mm.exe 31 PID 2516 wrote to memory of 2184 2516 mm.exe 31 PID 2516 wrote to memory of 2184 2516 mm.exe 31 PID 2516 wrote to memory of 2184 2516 mm.exe 31 PID 2516 wrote to memory of 2616 2516 mm.exe 33 PID 2516 wrote to memory of 2616 2516 mm.exe 33 PID 2516 wrote to memory of 2616 2516 mm.exe 33 PID 2516 wrote to memory of 2616 2516 mm.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06f5f623431d3515825f16ee3393b9f0_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\mm.exe"C:\Users\Admin\AppData\Local\Temp\mm.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {29dfdaf6-2655-4d7d-9dae-112ce811cf33};C:\Users\Admin\AppData\Local\Temp\mm.exe;25163⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2184
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
678KB
MD598d4825f348314a4f36b49233120b690
SHA19fd06a2c9dd29fc44e124b911b3d175dcc7dd4be
SHA256b93ff7d55363e69a3596559796f26e9725315d63c4d16717685b7b6f37fdfc36
SHA512c3bc6dea3e11277afd04cd02336af5cdbeaa76deb98805ae8497428814c77ca2bdb20a8fc835985a5961f310fe9a8c0d74cb119abd6e3a8084d3ca2c62f7de8b