Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe
-
Size
480KB
-
MD5
92fc6765e2551a2ee8d04fc0f555cf5f
-
SHA1
e01d78c68e15fb40d905c742f11c0d67b32a3eb8
-
SHA256
5732cf4e7f6b949636c8d448c734b51711aa276ca8108a351908301e05bb432b
-
SHA512
3a8cce21358aec7499e4df63e70a2c7d98efb742d6f30495b227ec3f6fea3cbce7287993ab58411c130a572342bf0b5b9ae13badfa26636661572b5e28988933
-
SSDEEP
6144:vb1GWAE410h2yzkcnfktitO6atDfemiAn8nHH9PkU1LjZfn/z8sKwFYu4xtt0tht:TY6nzkcncGO6at/4npz3ZHIsKwZtm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3.exe modiloader_stage2 behavioral1/memory/1976-30-0x0000000000400000-0x00000000004BA016-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
Processes:
stailuse.exe4.exe3.exepid process 2516 stailuse.exe 348 4.exe 1976 3.exe -
Loads dropped DLL 3 IoCs
Processes:
4.exe3.exepid process 348 4.exe 348 4.exe 1976 3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
stailuse.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"F:\\msdownld.tmp\\IXP000.TMP\\\"" stailuse.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
stailuse.exedescription ioc process File opened (read-only) \??\A: stailuse.exe File opened (read-only) \??\B: stailuse.exe File opened (read-only) \??\E: stailuse.exe -
Drops file in Program Files directory 1 IoCs
Processes:
3.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Fiele Ps.txt 3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
stailuse.exe4.exe3.exe92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stailuse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exepid process 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exestailuse.exe4.exe3.exedescription pid process target process PID 2972 wrote to memory of 2516 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe stailuse.exe PID 2972 wrote to memory of 2516 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe stailuse.exe PID 2972 wrote to memory of 2516 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe stailuse.exe PID 2972 wrote to memory of 2516 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe stailuse.exe PID 2972 wrote to memory of 2516 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe stailuse.exe PID 2972 wrote to memory of 2516 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe stailuse.exe PID 2972 wrote to memory of 2516 2972 92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe stailuse.exe PID 2516 wrote to memory of 348 2516 stailuse.exe 4.exe PID 2516 wrote to memory of 348 2516 stailuse.exe 4.exe PID 2516 wrote to memory of 348 2516 stailuse.exe 4.exe PID 2516 wrote to memory of 348 2516 stailuse.exe 4.exe PID 2516 wrote to memory of 348 2516 stailuse.exe 4.exe PID 2516 wrote to memory of 348 2516 stailuse.exe 4.exe PID 2516 wrote to memory of 348 2516 stailuse.exe 4.exe PID 348 wrote to memory of 1976 348 4.exe 3.exe PID 348 wrote to memory of 1976 348 4.exe 3.exe PID 348 wrote to memory of 1976 348 4.exe 3.exe PID 348 wrote to memory of 1976 348 4.exe 3.exe PID 348 wrote to memory of 1976 348 4.exe 3.exe PID 348 wrote to memory of 1976 348 4.exe 3.exe PID 348 wrote to memory of 1976 348 4.exe 3.exe PID 1976 wrote to memory of 1924 1976 3.exe IEXPLORE.EXE PID 1976 wrote to memory of 1924 1976 3.exe IEXPLORE.EXE PID 1976 wrote to memory of 1924 1976 3.exe IEXPLORE.EXE PID 1976 wrote to memory of 1924 1976 3.exe IEXPLORE.EXE PID 1976 wrote to memory of 1924 1976 3.exe IEXPLORE.EXE PID 1976 wrote to memory of 1924 1976 3.exe IEXPLORE.EXE PID 1976 wrote to memory of 1924 1976 3.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\92fc6765e2551a2ee8d04fc0f555cf5f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\stailuse.exec:\stailuse.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
F:\msdownld.tmp\IXP000.TMP\4.exeF:\msdownld.tmp\IXP000.TMP\4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"5⤵PID:1924
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451KB
MD5acdb53230f26df0c2a160820471edc74
SHA14f862f11ea5f00a355b9b728b6208c6dc06293d5
SHA256a1f9651dda04cbbc41947826a6630bc8bdd1f13d9261399be1b6eec9ee17c865
SHA512a01bf12c8798d04937d93975ed9d9fc65a2d767bd750062c64693d6f7ddc2ad8936d3d4cd4ef313f9b03bd073cbb7c53b60b3aab917b25eab41424f6782b7dc9
-
Filesize
684KB
MD5e0b53c768978c933c51d20af043203e7
SHA1e2f8c5127c513d465f55dd27d12e59cf0affed92
SHA256e0966ac4503a1114299627efe838cfed61f653fa196f01f5ca8e2af0a3073b3b
SHA5126c7178648dd7d5d1316f607f23bc70886404837599d1080a8a589c7b5ac45e98fc426394df238a622f94614fc4eb84ebc2d284f0a2d03aa53381bba315042d55
-
Filesize
675KB
MD5085b64aa9a82ae8f6fcbcdcf985a4b8f
SHA1a7d3f1094cbd8ae774aabe477ce5135b5e5c873c
SHA256314139973bbd6991a7e3620706b6a139b37e7aefe2ee3f4c7dd8801ae650cbed
SHA512534d1a29746f6ca2ad079dd49d58c8e2b9e551fee911814dedad65189132771b687bc653941047030a97c55130d0d6509d7f1c3b606061567c28c69fdc6bd60e