Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 04:45
Behavioral task
behavioral1
Sample
84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe
-
Size
101KB
-
MD5
84d35ec0d6aec982bde17e06334a7ad4
-
SHA1
275a5c9ddf386b02b26a7fcec77dff9f6ca843af
-
SHA256
40e3e55fe81432c17f8bf194c2cc524835031ab21e36902ac14b1f75bf5463fa
-
SHA512
b9fe7dcd14fb18112a7112164d2df5d62afd740054dcf5da771543aa08150fd158ab4d6b3dc09fe7a66426aa64a48430d47e09703895f3dc37bf42ba1605cce2
-
SSDEEP
1536:nD+qv+zI1xnV+x3/zHwyyR/pLNfCiLvwWfCHcAWmdXMwmL:n/r1ZVI3/p6/pxflDq82MhL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2736-40-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
server.exeserver.exepid Process 2908 server.exe 2964 server.exe -
Loads dropped DLL 2 IoCs
Processes:
84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exeserver.exepid Process 2736 84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe 2908 server.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
server.exedescription pid Process procid_target PID 2908 set thread context of 2964 2908 server.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exeserver.exeDllHost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
server.exepid Process 2964 server.exe 2964 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2624 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
DllHost.exepid Process 2624 DllHost.exe 2624 DllHost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exeserver.exeserver.exedescription pid Process procid_target PID 2736 wrote to memory of 2908 2736 84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2908 2736 84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2908 2736 84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe 30 PID 2736 wrote to memory of 2908 2736 84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2964 2908 server.exe 31 PID 2908 wrote to memory of 2964 2908 server.exe 31 PID 2908 wrote to memory of 2964 2908 server.exe 31 PID 2908 wrote to memory of 2964 2908 server.exe 31 PID 2908 wrote to memory of 2964 2908 server.exe 31 PID 2908 wrote to memory of 2964 2908 server.exe 31 PID 2908 wrote to memory of 2964 2908 server.exe 31 PID 2964 wrote to memory of 1204 2964 server.exe 21 PID 2964 wrote to memory of 1204 2964 server.exe 21 PID 2964 wrote to memory of 1204 2964 server.exe 21 PID 2964 wrote to memory of 1204 2964 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84d35ec0d6aec982bde17e06334a7ad4_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\server.exeC:\Users\Admin\AppData\Local\Temp\server.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5baafd7872339b0047642f11e91a410ac
SHA102bc1154c3f152901681f88f2bd31d8dce40cfc4
SHA25622dffb515df96bb26042eeec2313daad27db9b9f7085cf63c7bce0168606fb96
SHA5122b03ec4b52880aee84e652ba3f62a0cac4783ec52ceaad2afd03783081e24ca249cb9c951610b5ce555302bb48f625c8dcc5a892f8ada5381dfffe6d67fd26c2
-
Filesize
67KB
MD57f7c4774d29cb26a53d487e9a97a7215
SHA1e5547604db4153babb981b2eba7f1a0c6bf0f767
SHA256cd5c121fa48e72f2745c3a715400587bc1cbe2d36366849c203ccb6a154a6859
SHA5121ec0f70b51c0b51fe598b78b16a3d9064e82d50c22741e0471706937aec0dabc88a341a1952f9ce09a4b3a07f720523890356bab6c8a663ad75fc6361c7bbf18