Analysis
-
max time kernel
141s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 21:38
Behavioral task
behavioral1
Sample
9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe
-
Size
74KB
-
MD5
9e097e27488c3c0ea8142ef43bb3602b
-
SHA1
3d5e589a33bb15b8d88b3a42e6663d13c54700ef
-
SHA256
e2b9174ddd893e01b5384cfa8b09678d7f547be67afbaf23b3a3b27be94b92f2
-
SHA512
67deb7897efb426d5052c4c6d57cfb7a291ce52b0ea952df054ac3b1bfb475a8eaa576e77dcffa2a3b7f51c59d944776d96f98ec242378ea75ff99376c4f1ea0
-
SSDEEP
1536:4oqtQEcAycvL0bzOpuiCGJU2h5pBGuRoYGl/HcpBB2y:uQv0DmOJ62htYYm8HB2y
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/files/0x000900000001756e-3.dat modiloader_stage2 behavioral1/memory/2904-8-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral1/memory/2296-9-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral1/memory/2296-21-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2296 Updadll.exe -
Loads dropped DLL 2 IoCs
pid Process 2904 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 2904 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\OleFiles\Updadll.exe 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe File opened for modification C:\Windows\OleFiles\Updadll.exe 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updadll.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe 2296 Updadll.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2296 2904 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2296 2904 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2296 2904 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 29 PID 2904 wrote to memory of 2296 2904 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\OleFiles\Updadll.exeC:\Windows\OleFiles\Updadll.exe /Melt C:\Users\Admin\AppData\Local\Temp\9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD59e097e27488c3c0ea8142ef43bb3602b
SHA13d5e589a33bb15b8d88b3a42e6663d13c54700ef
SHA256e2b9174ddd893e01b5384cfa8b09678d7f547be67afbaf23b3a3b27be94b92f2
SHA51267deb7897efb426d5052c4c6d57cfb7a291ce52b0ea952df054ac3b1bfb475a8eaa576e77dcffa2a3b7f51c59d944776d96f98ec242378ea75ff99376c4f1ea0