Analysis
-
max time kernel
123s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 02:08
Behavioral task
behavioral1
Sample
aa96e40363e19b4a3492662983805771_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
aa96e40363e19b4a3492662983805771_JaffaCakes118.exe
-
Size
27KB
-
MD5
aa96e40363e19b4a3492662983805771
-
SHA1
9e3d61ce12815e4c7f7398d5cf99e03072673172
-
SHA256
02281901066095d95f18550bda6e6c780fe38e1fbcb6d1d0065b12d3b93c3d23
-
SHA512
4a9e48aa308df2cac1a30e4403bba0f3c949ebe45d4dcdb7903057c6fa80bd7d3d3773ff9e887463a0f5b8c65eea3df1586031d37f41c5e8ee6ac8a767ca8e69
-
SSDEEP
384:BCkp9PmiCXlBHmCT01Jx90A+Q+u5A5b2Wh+jFRDXdGtJOBxuvrMG929Ueu:zp9f2GCg7EAKbkFRMODuvIG4y
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2848-5-0x0000000013140000-0x000000001314E000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2848 set thread context of 2456 2848 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 31 -
resource yara_rule behavioral1/memory/2456-6-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2456-3-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2456-8-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2456-18-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1792 sc.exe 1820 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa96e40363e19b4a3492662983805771_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa96e40363e19b4a3492662983805771_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2456 2848 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2456 2848 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2456 2848 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2456 2848 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2456 2848 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2456 2848 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 31 PID 2456 wrote to memory of 2336 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 32 PID 2456 wrote to memory of 2336 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 32 PID 2456 wrote to memory of 2336 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 32 PID 2456 wrote to memory of 2336 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 32 PID 2456 wrote to memory of 2332 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 33 PID 2456 wrote to memory of 2332 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 33 PID 2456 wrote to memory of 2332 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 33 PID 2456 wrote to memory of 2332 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 33 PID 2332 wrote to memory of 2856 2332 net.exe 36 PID 2332 wrote to memory of 2856 2332 net.exe 36 PID 2332 wrote to memory of 2856 2332 net.exe 36 PID 2332 wrote to memory of 2856 2332 net.exe 36 PID 2336 wrote to memory of 2320 2336 net.exe 37 PID 2336 wrote to memory of 2320 2336 net.exe 37 PID 2336 wrote to memory of 2320 2336 net.exe 37 PID 2336 wrote to memory of 2320 2336 net.exe 37 PID 2456 wrote to memory of 1792 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 38 PID 2456 wrote to memory of 1792 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 38 PID 2456 wrote to memory of 1792 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 38 PID 2456 wrote to memory of 1792 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 38 PID 2456 wrote to memory of 1820 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 39 PID 2456 wrote to memory of 1820 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 39 PID 2456 wrote to memory of 1820 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 39 PID 2456 wrote to memory of 1820 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 39 PID 2456 wrote to memory of 2560 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 43 PID 2456 wrote to memory of 2560 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 43 PID 2456 wrote to memory of 2560 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 43 PID 2456 wrote to memory of 2560 2456 aa96e40363e19b4a3492662983805771_JaffaCakes118.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1792
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\aa96e40363e19b4a3492662983805771_JaffaCakes118.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3