Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 09:36
Behavioral task
behavioral1
Sample
abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe
-
Size
21KB
-
MD5
abdaa4e9d872b53b6b13b806fb41bbbf
-
SHA1
058851204a09db9c0931d58b8d737201ce162294
-
SHA256
19d8ca024b514e8f5020bc6e78b2e1b0554a94fe8e9fcbfd97c3a89c3c1b28b9
-
SHA512
452259f7dce3ee3e44e8efd7ef338eeb775d75d67bf678377edc8a9fdfe9480e7d87a730439036c539cca4425dbc7fcb3a04ab9f4ad9e26593ac6da980175125
-
SSDEEP
384:LPozK7rUdtBat52onuUxByAbyd65skPUbbeSrX+7W95NwrXh:TkK7oHB051uUXTboeTUbbdu7m
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2244-6-0x0000000013140000-0x0000000013151000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1224 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 2412 2244 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 28 -
resource yara_rule behavioral1/memory/2244-0-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/2244-6-0x0000000013140000-0x0000000013151000-memory.dmp upx behavioral1/memory/2412-4-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2412-8-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2412-11-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2412-13-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2412-21-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2944 sc.exe 2952 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2412 2244 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2412 2244 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2412 2244 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2412 2244 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2412 2244 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 28 PID 2244 wrote to memory of 2412 2244 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 28 PID 2412 wrote to memory of 2904 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2904 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2904 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2904 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2576 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2576 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2576 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2576 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 30 PID 2904 wrote to memory of 2932 2904 net.exe 33 PID 2904 wrote to memory of 2932 2904 net.exe 33 PID 2904 wrote to memory of 2932 2904 net.exe 33 PID 2904 wrote to memory of 2932 2904 net.exe 33 PID 2576 wrote to memory of 2892 2576 net.exe 34 PID 2576 wrote to memory of 2892 2576 net.exe 34 PID 2576 wrote to memory of 2892 2576 net.exe 34 PID 2576 wrote to memory of 2892 2576 net.exe 34 PID 2412 wrote to memory of 2944 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2944 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2944 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2944 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 35 PID 2412 wrote to memory of 2952 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 36 PID 2412 wrote to memory of 2952 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 36 PID 2412 wrote to memory of 2952 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 36 PID 2412 wrote to memory of 2952 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 36 PID 2412 wrote to memory of 1224 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 42 PID 2412 wrote to memory of 1224 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 42 PID 2412 wrote to memory of 1224 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 42 PID 2412 wrote to memory of 1224 2412 abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\net.exenet stop wscsvc3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc4⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Windows\SysWOW64\sc.exesc delete wscsvc3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\sc.exesc delete sharedaccess3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.bat C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\abdaa4e9d872b53b6b13b806fb41bbbf_JaffaCakes118.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1224
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD5e3b0a4ae48f7cfe95b51f8d3cfd329d0
SHA116d9435d895dcf1680baf5b8ebc6342f561af049
SHA25690423a49e145f44c6cefc80ba4351d04a4eaaee2b86e38aad1d9927fbad3d7bf
SHA5125abd674b6e8896bedacd7e0ae593d49771f5c5a036adab1963a37e38f5f2cf185b157d101e97c6e1572b5ae4dfcbfa0470871b2faa0a8d96c6dae19b1329b9f3