Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe
-
Size
236KB
-
MD5
8a8971f8015a55cda30b19aa5e996e11
-
SHA1
9e7681c471c6db1255d728f4653628eac17a2ced
-
SHA256
01c015f8b920121a7e36587fe1dd0511dbd7629da24659f3f2637b2c9aae2696
-
SHA512
b36fa43c9cfe56d8bc399cde64e7c6ee94fe929843d7765233c43d843349876907cedc2b74393a8ca3e71d67039f4d38424d36342e3348598a526d97ca390e2d
-
SSDEEP
6144:rW2+7Ube0xA2CZPK9p8yAFmCqYah1y/emK:/be0bCM9p8BQWahsPK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3016-29-0x00000000001B0000-0x00000000001D4000-memory.dmp modiloader_stage2 behavioral1/memory/3016-33-0x00000000001B0000-0x00000000001D4000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
ÎÞÓÇ´°¿Ú.exesad.exepid Process 2468 ÎÞÓÇ´°¿Ú.exe 3016 sad.exe -
Loads dropped DLL 5 IoCs
Processes:
8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exesad.exepid Process 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 3016 sad.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/files/0x0007000000019609-8.dat upx behavioral1/memory/2468-13-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/2468-14-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
Processes:
sad.exedescription ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll sad.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
sad.exepid Process 3016 sad.exe 3016 sad.exe 3016 sad.exe 3016 sad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
sad.exepid Process 3016 sad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exedescription pid Process procid_target PID 2480 wrote to memory of 2468 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2468 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2468 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2468 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 31 PID 2480 wrote to memory of 3016 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 32 PID 2480 wrote to memory of 3016 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 32 PID 2480 wrote to memory of 3016 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 32 PID 2480 wrote to memory of 3016 2480 8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a8971f8015a55cda30b19aa5e996e11_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÎÞÓÇ´°¿Ú.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÎÞÓÇ´°¿Ú.exe2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sad.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sad.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD55546c44ce6a87e8c1d4589f46431c57c
SHA1cd6b86c4aef6140de23ccc30ac16722d5b11bb0e
SHA25699ac9801f9015aba3577d9843147b4e9d6f7c81a259380d446d206e65a8bda16
SHA5127e06f797dd0890d677bf9e3f63bdf396133160a90f3a288ab31f4e985d28b15957088d6a251ef41d22c8147ba0a98c36a0a4842e55041bfd93c892343909b57b
-
Filesize
135KB
MD5723367e224fb8c6adad57940b468cc9a
SHA10ad475614da0b31885c9169ff0975468c835dcd7
SHA2563c0724076de43ae22c1bbab29bc114ee6c8fbce398c1bc35156c77b2b98a9769
SHA512e0234283581c4e1033869e797de35e593c60cd7e3559c0eb070f4cb43aea7fbbd41b12172050046bcfb24fee1e31a1ddf335d4049b286b43b1165fbe0e20e202
-
Filesize
21KB
MD5e19d94ab93a20167b54d9f76eafa99c1
SHA1da46bfd659056d01f2f4d7f9afb322a016c260de
SHA25626b057217b155fb06209b6c3319c5b34a567834d39d0bc420c6119c26ff0e84f
SHA512f4b04bb38ae4149d3cba1207dabb0d8a8231a69d9b338091fe64e946c2344f30d943ae42a12bf71c847bdbc46c8da5890d851ccb1407497585ea6705844d9ee7