Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
a41452404631c973176d912d6cbf7681_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a41452404631c973176d912d6cbf7681_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a41452404631c973176d912d6cbf7681_JaffaCakes118.exe
-
Size
591KB
-
MD5
a41452404631c973176d912d6cbf7681
-
SHA1
02997ce62466199829a90a4540940886b783e20d
-
SHA256
db35aa1417f0091d67fe4613af5d7b72c315f5ba8d0a239fd26890d5eef69c89
-
SHA512
7aed608a28fe5b9f4a355ea0a59d802ac066bd4a84c62453fc888788c3f83843d2654c1bb88e0f3d69325973d5511070e03d25b81a15ae6b06146bf0cfdaa73a
-
SSDEEP
12288:0YgOMDy+NI4RvqTIMwrVWIbhMorKF3Z4mxx0oEtlK+kt9T2MM:tgL+atRvlMwr4bQmXNGp
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/4028-63-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/3896-87-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/4028-95-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 behavioral2/memory/3896-98-0x0000000000400000-0x0000000000557000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3896 rejoice81.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\X: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\B: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\J: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\P: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\R: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\T: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\U: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\Y: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\A: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\G: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\I: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\Z: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\K: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\M: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\N: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\W: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\E: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\H: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\L: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\O: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\Q: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened (read-only) \??\S: a41452404631c973176d912d6cbf7681_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened for modification F:\AutoRun.inf a41452404631c973176d912d6cbf7681_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice81.exe rejoice81.exe File opened for modification C:\Windows\SysWOW64\_rejoice81.exe rejoice81.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3896 set thread context of 2004 3896 rejoice81.exe 86 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice81.exe a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice81.exe a41452404631c973176d912d6cbf7681_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat a41452404631c973176d912d6cbf7681_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 100 3896 WerFault.exe 85 5092 2004 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a41452404631c973176d912d6cbf7681_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3896 4028 a41452404631c973176d912d6cbf7681_JaffaCakes118.exe 85 PID 4028 wrote to memory of 3896 4028 a41452404631c973176d912d6cbf7681_JaffaCakes118.exe 85 PID 4028 wrote to memory of 3896 4028 a41452404631c973176d912d6cbf7681_JaffaCakes118.exe 85 PID 3896 wrote to memory of 2004 3896 rejoice81.exe 86 PID 3896 wrote to memory of 2004 3896 rejoice81.exe 86 PID 3896 wrote to memory of 2004 3896 rejoice81.exe 86 PID 3896 wrote to memory of 2004 3896 rejoice81.exe 86 PID 3896 wrote to memory of 2004 3896 rejoice81.exe 86 PID 3896 wrote to memory of 1932 3896 rejoice81.exe 87 PID 3896 wrote to memory of 1932 3896 rejoice81.exe 87 PID 4028 wrote to memory of 4072 4028 a41452404631c973176d912d6cbf7681_JaffaCakes118.exe 94 PID 4028 wrote to memory of 4072 4028 a41452404631c973176d912d6cbf7681_JaffaCakes118.exe 94 PID 4028 wrote to memory of 4072 4028 a41452404631c973176d912d6cbf7681_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a41452404631c973176d912d6cbf7681_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a41452404631c973176d912d6cbf7681_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice81.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice81.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 124⤵
- Program crash
PID:5092
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 6883⤵
- Program crash
PID:100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""2⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 2004 -ip 20041⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3896 -ip 38961⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD5ec717a148c0c1573ad6a89a66095c8a0
SHA12677e5c816b191a5941be928f014ec201e7de18f
SHA256d9c1af73c937692718c241a501d6213fac7803ab2f8504a845a540baf047c218
SHA5121a925338fbdbb79bb8e38064b092d5a2dbd47095751ac9e88490f255db050598f209aa97da0d8a9984e173059cb13019d2f187d0efc9777afc6fcf82fb763797
-
Filesize
212B
MD55fe82b9f4a9e2280c494b0ff4f017746
SHA16f0fe930869f11bc981e6ed320568d892f22c9f5
SHA256e8f519343fd0b3149d64a061b9668b4e3ab9d4be24416f1e8084c6b1c950103d
SHA512b8358711ce02f94b677da240d13d49b5ed271f24b079318dd139e8bcc45fb38021569e695fd13d272b693584bb9722d743da063f08271ae176d57e649f801dc0
-
Filesize
591KB
MD5a41452404631c973176d912d6cbf7681
SHA102997ce62466199829a90a4540940886b783e20d
SHA256db35aa1417f0091d67fe4613af5d7b72c315f5ba8d0a239fd26890d5eef69c89
SHA5127aed608a28fe5b9f4a355ea0a59d802ac066bd4a84c62453fc888788c3f83843d2654c1bb88e0f3d69325973d5511070e03d25b81a15ae6b06146bf0cfdaa73a