Analysis
-
max time kernel
67s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe
-
Size
785KB
-
MD5
ec0f0f03dc4b924cf98be8a2b442ffc4
-
SHA1
3897d2869f1c5e5e63e5a8db2694b31b7cec653a
-
SHA256
b0a561b7d680607d0b08c522e0e45af49aff4389d078f819b4e33a43db586f7f
-
SHA512
10b761e492add4cecd667a3f5944c40d25e19b21ee41924b30f0f27db07c6aeed12add1e891c712fca8659bfb3f94ddb1e377e0f19dbbc46b8e880cd22cd1280
-
SSDEEP
12288:r+/KiqEaOtfFFjSkxmGlICB54FhVtu/zkHQP8daKBF3Z4mxxJyOjhdIVjG/:CrFayFFWUhuCG0QwU0KBQmXxdSU/
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2768-41-0x0000000000400000-0x0000000000586000-memory.dmp modiloader_stage2 behavioral1/memory/2768-49-0x0000000000400000-0x0000000000586000-memory.dmp modiloader_stage2 behavioral1/memory/1868-50-0x0000000000400000-0x0000000000586000-memory.dmp modiloader_stage2 behavioral1/memory/1868-52-0x0000000000400000-0x0000000000586000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1868 rejoice47.exe -
Loads dropped DLL 5 IoCs
pid Process 2768 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 2768 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 2684 1868 rejoice47.exe 31 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2880 1868 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1868 2768 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 30 PID 2768 wrote to memory of 1868 2768 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 30 PID 2768 wrote to memory of 1868 2768 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 30 PID 2768 wrote to memory of 1868 2768 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 30 PID 1868 wrote to memory of 2684 1868 rejoice47.exe 31 PID 1868 wrote to memory of 2684 1868 rejoice47.exe 31 PID 1868 wrote to memory of 2684 1868 rejoice47.exe 31 PID 1868 wrote to memory of 2684 1868 rejoice47.exe 31 PID 1868 wrote to memory of 2684 1868 rejoice47.exe 31 PID 1868 wrote to memory of 2684 1868 rejoice47.exe 31 PID 1868 wrote to memory of 2880 1868 rejoice47.exe 32 PID 1868 wrote to memory of 2880 1868 rejoice47.exe 32 PID 1868 wrote to memory of 2880 1868 rejoice47.exe 32 PID 1868 wrote to memory of 2880 1868 rejoice47.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 3203⤵
- Loads dropped DLL
- Program crash
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785KB
MD5ec0f0f03dc4b924cf98be8a2b442ffc4
SHA13897d2869f1c5e5e63e5a8db2694b31b7cec653a
SHA256b0a561b7d680607d0b08c522e0e45af49aff4389d078f819b4e33a43db586f7f
SHA51210b761e492add4cecd667a3f5944c40d25e19b21ee41924b30f0f27db07c6aeed12add1e891c712fca8659bfb3f94ddb1e377e0f19dbbc46b8e880cd22cd1280