Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe
-
Size
128KB
-
MD5
e2ae97affafcb65764219b3f4b4748dd
-
SHA1
3765b0850f2a93487b2af4f93ef1b1cad3c9af71
-
SHA256
e46ef6f90216b0aecda8b2e906892877ed365e9a07a7701c232f7b722758f1c8
-
SHA512
96bd468e0f5c063b70a2d11984ab4b110fd125ffc69d2ec712c7939262d33809837652f16053d46ef64e2dcaa66cba6d5f7e58f974f7d4e56a008d5f9d2cda05
-
SSDEEP
3072:CfbxZHyKEY1gDTBb8kftadzyOyNE53LzqrrrrrrrrrrrrrrrrrrrrrrrrrrrrrB:CfbxZmYOT6kftsyrKJz
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral1/memory/1572-84-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/memory/1572-83-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/memory/1572-82-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/memory/1572-98-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/memory/1572-100-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/memory/1572-108-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/memory/1572-110-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/memory/1572-111-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 -
Executes dropped EXE 4 IoCs
pid Process 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2924 simrp.exe 2288 simrp.exe 1572 simrp.exe -
Loads dropped DLL 6 IoCs
pid Process 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\cmarp = "C:\\Users\\Admin\\AppData\\Roaming\\simrp.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\sidebars = "C:\\Users\\Admin\\AppData\\Roaming\\simrp.exe" simrp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2112 set thread context of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2924 set thread context of 2288 2924 simrp.exe 33 PID 2924 set thread context of 1572 2924 simrp.exe 34 -
resource yara_rule behavioral1/memory/2744-15-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2744-13-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2744-24-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2744-21-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2744-25-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2744-27-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2744-26-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2744-50-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1572-84-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-83-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-82-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-81-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-78-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-76-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-72-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-70-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-98-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2288-99-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/1572-100-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-108-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-110-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1572-111-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language simrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language simrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language simrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1216 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1572 simrp.exe 1572 simrp.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe Token: SeDebugPrivilege 2288 simrp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 2924 simrp.exe 2288 simrp.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2744 2112 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 31 PID 2744 wrote to memory of 2924 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 32 PID 2744 wrote to memory of 2924 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 32 PID 2744 wrote to memory of 2924 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 32 PID 2744 wrote to memory of 2924 2744 e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe 32 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 2288 2924 simrp.exe 33 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2924 wrote to memory of 1572 2924 simrp.exe 34 PID 2288 wrote to memory of 1216 2288 simrp.exe 35 PID 2288 wrote to memory of 1216 2288 simrp.exe 35 PID 2288 wrote to memory of 1216 2288 simrp.exe 35 PID 2288 wrote to memory of 1216 2288 simrp.exe 35 PID 2288 wrote to memory of 1216 2288 simrp.exe 35 PID 2288 wrote to memory of 1216 2288 simrp.exe 35 PID 1216 wrote to memory of 2548 1216 ipconfig.exe 37 PID 1216 wrote to memory of 2548 1216 ipconfig.exe 37 PID 1216 wrote to memory of 2548 1216 ipconfig.exe 37 PID 1216 wrote to memory of 2548 1216 ipconfig.exe 37 PID 2548 wrote to memory of 2732 2548 cmd.exe 39 PID 2548 wrote to memory of 2732 2548 cmd.exe 39 PID 2548 wrote to memory of 2732 2548 cmd.exe 39 PID 2548 wrote to memory of 2732 2548 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2ae97affafcb65764219b3f4b4748dd_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\simrp.exe"C:\Users\Admin\AppData\Roaming\simrp.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Roaming\simrp.exe"C:\Users\Admin\AppData\Roaming\simrp.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\system32\ipconfig.exe"5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QJYIQ.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "cmarp" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\simrp.exe" /f7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\simrp.exe"C:\Users\Admin\AppData\Roaming\simrp.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5cd8b99c10305e1699afc19dada2185ef
SHA10b84d6cf75079618301f81df74ed61842b06bf8c
SHA256a14dce385fa9cb4631f0fba7540efd2cc88d6288e40eac032d7236f7a39482d7
SHA51210262744d861a4680f2d8dd2aab8a69eddf9d0354adc5d58e0b5c9f301fc42505c572a1efe74698900ec1ccffc5819d5e109fddbd9135c353cb2475903271bac
-
Filesize
128KB
MD5e2ae97affafcb65764219b3f4b4748dd
SHA13765b0850f2a93487b2af4f93ef1b1cad3c9af71
SHA256e46ef6f90216b0aecda8b2e906892877ed365e9a07a7701c232f7b722758f1c8
SHA51296bd468e0f5c063b70a2d11984ab4b110fd125ffc69d2ec712c7939262d33809837652f16053d46ef64e2dcaa66cba6d5f7e58f974f7d4e56a008d5f9d2cda05
-
Filesize
128KB
MD570af89e4810fef55f1eaa674c78debd8
SHA15da45518fc1fdfdde3dc3fd6e7e5fdc1018b6b83
SHA2562952814d7620130a6a6266f2c533e672b2e26f7d28842d49bbcd80db402d1f6c
SHA512bdaff224df42d21b1dc3349bd6503929325da6a29dafd7f04d1d3d5486fa91e3547260a5f7544fd4da7672baf82ab694cba5cd778fc3738a0c83d23778e5cd1d