Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
d599488a1f3eeae8a64687aced847fad
-
SHA1
dfb78edb35197f2f80519fcde991b132c6184160
-
SHA256
099a1c2361247e7e74ed6f13b09421bcca71d2fb5641d8db3a922f6272d32666
-
SHA512
74f9ca9a2a9cf659681f111d3fdd305dd94c68d21054c5947be887a1c74ec70b8ac269e60524b6836593006d96baa4cb5c6c9aa8436cd11aad286d51beed61ec
-
SSDEEP
24576:VV0fsaxQV7w49bwKxtkkgV0fsaxQV7w49bwKxtkL:VV0GV7Tww9gV0GV7Twwa
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 6 IoCs
resource yara_rule behavioral2/memory/5052-11-0x0000000000400000-0x000000000041F000-memory.dmp modiloader_stage2 behavioral2/memory/4692-31-0x00000000020E0000-0x0000000002105000-memory.dmp modiloader_stage2 behavioral2/memory/4692-30-0x00000000020E0000-0x0000000002105000-memory.dmp modiloader_stage2 behavioral2/memory/5052-32-0x0000000000400000-0x000000000041F000-memory.dmp modiloader_stage2 behavioral2/memory/5052-34-0x0000000000680000-0x00000000006A5000-memory.dmp modiloader_stage2 behavioral2/memory/4692-35-0x00000000020E0000-0x0000000002105000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 5052 e577494.tmp.exe 4692 e5774f2.tmp.exe -
Loads dropped DLL 5 IoCs
pid Process 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll e577494.tmp.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e577494.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5774f2.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe 5052 e577494.tmp.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe 4692 e5774f2.tmp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 5052 e577494.tmp.exe 4692 e5774f2.tmp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4932 wrote to memory of 5052 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 83 PID 4932 wrote to memory of 5052 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 83 PID 4932 wrote to memory of 5052 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 83 PID 4932 wrote to memory of 4692 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 84 PID 4932 wrote to memory of 4692 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 84 PID 4932 wrote to memory of 4692 4932 d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d599488a1f3eeae8a64687aced847fad_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\e577494.tmp.exeC:\Users\Admin\AppData\Local\Temp\e577494.tmp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\e5774f2.tmp.exeC:\Users\Admin\AppData\Local\Temp\e5774f2.tmp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5a9aa5a1c31d419a464c89d3dc78431fc
SHA148affccd6e74eadcf3421220cc03625f942ad96e
SHA25668b230a1f7cdf4e12589203209290cf6a71d6b7ffcbaecfa8caa11eea53e3dec
SHA5128a9d66ca9e8364e1f76a086d9363c148b8bacae54561d6f1f0c8d97741f1b30f4e25195f8c7f73c3959409246157352a72d403f9e93cef9652ac8b4faaa4f3ed
-
Filesize
1.1MB
MD571520e2e016f657e0131181c093af6e0
SHA198b542d747b2dfd57ea69e42ffc8e6a6f05d18cb
SHA256c77f7719ef55800ebc692edb5523f6becd83bdc25b8bc6f7dbff3c6243ef76ae
SHA512d48758acc8767a78b898152efac9ce31e043904dcaddc0e60c3145bc7250e8384913833f33f717d986f2f9262a3e82ecde13b4fbece851b2b8b70af43a177b71
-
Filesize
38KB
MD5e61241358211a033cda36e48b68d91a3
SHA1ca2dd3dd6114f62b95f0c35edf3715439beca080
SHA25609665e44e74d607599c09824b53434e927f72b704e1124caef4f07a54eb3a341
SHA512b24db602be7192105459966970bde1bc6a33fbef7dba8185d31a49cbdd626f7ddf9350e566230ecd372dc8e462faed4175ff7f4b4221c6464bc36b71e65a4f0b
-
Filesize
29KB
MD519f9a0a0490061125426703a1931f59a
SHA161fa131f972d334d2757da19121fd330043d648d
SHA2561bdace947cf17dfacc0756263739602096099952d1ca079e28a61192bbdca3e9
SHA512690cefa97eb684ce1bbfdfcfbf08e68d95b193f16ec1f714da36a9bd893ed1bc0a80d83223da9808cac96b41e281c48f730a52000a0fe4436ce40d6ef77b98a3