Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 03:20
Static task
static1
Behavioral task
behavioral1
Sample
d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
d06911e47926e4f42b13cd50b8bafe64
-
SHA1
e8898d04a2447e2fcf6dbf8170a8ad32dfa5f937
-
SHA256
d9a3874f938879317a93cda4cc0eb7e3a58e388bcd23c83eacb90824fbbc4680
-
SHA512
78a1e2b2a15a2f8ed42741fc7f06c3afbd4e3173b600d3ec8cbf8a04fd117fbc5bb2669a0acce9a535f6cc6377a72543569e93f92e4b46cb734291541c6f4c31
-
SSDEEP
49152:k6E/tOO6mW3DXN5vQWzK89XWwlYgLWI0fbheI85SD:kfOO6m0vtK8hWwlxgNeFsD
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/3256-52-0x0000000000400000-0x00000000006FD000-memory.dmp modiloader_stage2 behavioral2/memory/1496-53-0x0000000000400000-0x00000000006FD000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3256 rejoice47.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1496 wrote to memory of 3256 1496 d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe 83 PID 1496 wrote to memory of 3256 1496 d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe 83 PID 1496 wrote to memory of 3256 1496 d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe 83 PID 3256 wrote to memory of 4112 3256 rejoice47.exe 84 PID 3256 wrote to memory of 4112 3256 rejoice47.exe 84 PID 3256 wrote to memory of 4112 3256 rejoice47.exe 84 PID 3256 wrote to memory of 2840 3256 rejoice47.exe 85 PID 3256 wrote to memory of 2840 3256 rejoice47.exe 85 PID 1496 wrote to memory of 4804 1496 d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe 86 PID 1496 wrote to memory of 4804 1496 d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe 86 PID 1496 wrote to memory of 4804 1496 d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d06911e47926e4f42b13cd50b8bafe64_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4112
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:2840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""2⤵
- System Location Discovery: System Language Discovery
PID:4804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5e37865df95851655761d369360d1d505
SHA1708c1fb2327ddc987279f224569bfefb232f1e06
SHA2569ac224daae60c522aaea533f55b9db70ce0ba7a656def34fe1127ff0727ce7ee
SHA512524abfdf79210a923c2ce5e7bf355751e33866338e025b4700be4903dd1a773e68ed8c1857c6d28ef5865048cb7f2c0e74e4c42a40e6baaf00e36ae2be86c571
-
Filesize
3.0MB
MD5d06911e47926e4f42b13cd50b8bafe64
SHA1e8898d04a2447e2fcf6dbf8170a8ad32dfa5f937
SHA256d9a3874f938879317a93cda4cc0eb7e3a58e388bcd23c83eacb90824fbbc4680
SHA51278a1e2b2a15a2f8ed42741fc7f06c3afbd4e3173b600d3ec8cbf8a04fd117fbc5bb2669a0acce9a535f6cc6377a72543569e93f92e4b46cb734291541c6f4c31