Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe
-
Size
444KB
-
MD5
b220724a2e9600b554ccd887c7a39880
-
SHA1
36b799acdaf3870f51aaa229b1c4033d554a72e1
-
SHA256
ea36623677d38a1901dbc5405f1087e62b1ead90a65401387bbbfeb8be850e40
-
SHA512
d3f154e024f69168ce0e1564a888d42f981029a9ef30c747d4321a7fa46e87be9f1d26e57e5d7625675ecd459556bfc0d2528a4fef0951d727c7a42187b0456d
-
SSDEEP
12288:SV+mzFHYEt+UmeGhiHbT613/p0thOYxG26sh+VR:S83x4GYbTWSthG2B+VR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2808-23-0x0000000000220000-0x0000000000243000-memory.dmp modiloader_stage2 behavioral1/memory/2808-24-0x0000000000220000-0x0000000000243000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2808 QQ.exe -
Loads dropped DLL 3 IoCs
pid Process 656 b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe 656 b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe 2808 QQ.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\%system% b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe File created C:\Program Files (x86)\%system%\__tmp_rar_sfx_access_check_259470784 b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe File created C:\Program Files (x86)\%system%\QQ.exe b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system%\QQ.exe b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe File created C:\Program Files (x86)\%system%\090316.exe b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\%system%\090316.exe b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll QQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2808 QQ.exe 2808 QQ.exe 2808 QQ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 2808 QQ.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 QQ.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 656 wrote to memory of 2808 656 b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe 30 PID 656 wrote to memory of 2808 656 b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe 30 PID 656 wrote to memory of 2808 656 b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe 30 PID 656 wrote to memory of 2808 656 b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b220724a2e9600b554ccd887c7a39880_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Program Files (x86)\%system%\QQ.exe"C:\Program Files (x86)\%system%\QQ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5b41cf0e0cff16ad5c5c46ca0cc72c8b4
SHA1a7cc123dadbaf7d2811b524fa80d4fcbff967973
SHA256007047c0a03878eb4e81f526f0ff4006d96bcac955ba7f398758b18467986256
SHA512813f64e368e7c7a03d8f0d8b4e7cb67065aeaa27ba174d77b118fc5d2ccfea9661fc48e8013bb92c9cd2ca6446c15573e3c028d9f641b91f065d6e3f30116af8
-
Filesize
20KB
MD533cb3dcfbde8200a0144f98a46467f14
SHA1a95ec9ed18295dd2e4ae46ac8731c97d90a11c90
SHA25692638efda9726a9ecd2f235e603614aa1c7e01d1789b15f8430c92e9e9823f97
SHA512b25f1d7ff5856c69f124d6294ac792c9a73f04fe196a55ccb94870084e1a0de1decf6444086b5efba087f34a332074e61081ea97d3d4225f0cc9f79cb7743c9e