Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe
-
Size
682KB
-
MD5
a43df25f38c779f1fbc5a6283a926c42
-
SHA1
1b2954747524f2f1d0ac85d9009b17841bdf3fce
-
SHA256
1de0d1c6493e7814960bee852aa2921e2eba17476b34e8e89719bed3958561b7
-
SHA512
7710f1500533af908aef2522dc8a11d7ab6a3a53e6dc15408011a3a4c927e25572386771cfee01cc30e67d8357051041df9de12473c7c471fa9f4585f32bf8bd
-
SSDEEP
12288:Voo3Yd2eZQK7NWoxc9nA7Y2kRf20x0I61crGKmmttGvtF3Z4mxx9DqVTVOC4:Wo3YdzlgxgYzRjx0I6ChmmtitQmX8VT8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2096-37-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 behavioral1/memory/2096-46-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 behavioral1/memory/2684-48-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 behavioral1/memory/2684-50-0x0000000000400000-0x000000000056B000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 rejoice471.exe -
Loads dropped DLL 5 IoCs
pid Process 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice471.exe rejoice471.exe File opened for modification C:\Windows\SysWOW64\_rejoice471.exe rejoice471.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2592 2684 rejoice471.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice471.exe a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice471.exe a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2740 2684 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice471.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2592 calc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2684 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2684 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2684 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2684 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 30 PID 2684 wrote to memory of 2592 2684 rejoice471.exe 31 PID 2684 wrote to memory of 2592 2684 rejoice471.exe 31 PID 2684 wrote to memory of 2592 2684 rejoice471.exe 31 PID 2684 wrote to memory of 2592 2684 rejoice471.exe 31 PID 2684 wrote to memory of 2592 2684 rejoice471.exe 31 PID 2684 wrote to memory of 2592 2684 rejoice471.exe 31 PID 2684 wrote to memory of 2740 2684 rejoice471.exe 32 PID 2684 wrote to memory of 2740 2684 rejoice471.exe 32 PID 2684 wrote to memory of 2740 2684 rejoice471.exe 32 PID 2684 wrote to memory of 2740 2684 rejoice471.exe 32 PID 2096 wrote to memory of 2732 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 33 PID 2096 wrote to memory of 2732 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 33 PID 2096 wrote to memory of 2732 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 33 PID 2096 wrote to memory of 2732 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 33 PID 2096 wrote to memory of 2732 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 33 PID 2096 wrote to memory of 2732 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 33 PID 2096 wrote to memory of 2732 2096 a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a43df25f38c779f1fbc5a6283a926c42_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice471.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice471.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵
- Suspicious use of UnmapMainImage
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 3003⤵
- Loads dropped DLL
- Program crash
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5381100f08ea134c492f6620ac327fe80
SHA16420d6f0d2e007fdfdd1fd2a8b207a338d46509c
SHA25625602b6d04e682d58e38906e37eac3556d5756242c9d9e31724c42c45e4e5e69
SHA5122a8d19124d13dbd0b7fa43e319db6ccbb9fa2d023d1709560a8a220332beb3a2d3ca1d99f77eca5c953b749697879f992b0502c6d7cd6dcb42d54d7cd0e983db
-
Filesize
682KB
MD5a43df25f38c779f1fbc5a6283a926c42
SHA11b2954747524f2f1d0ac85d9009b17841bdf3fce
SHA2561de0d1c6493e7814960bee852aa2921e2eba17476b34e8e89719bed3958561b7
SHA5127710f1500533af908aef2522dc8a11d7ab6a3a53e6dc15408011a3a4c927e25572386771cfee01cc30e67d8357051041df9de12473c7c471fa9f4585f32bf8bd