Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe
-
Size
785KB
-
MD5
ec0f0f03dc4b924cf98be8a2b442ffc4
-
SHA1
3897d2869f1c5e5e63e5a8db2694b31b7cec653a
-
SHA256
b0a561b7d680607d0b08c522e0e45af49aff4389d078f819b4e33a43db586f7f
-
SHA512
10b761e492add4cecd667a3f5944c40d25e19b21ee41924b30f0f27db07c6aeed12add1e891c712fca8659bfb3f94ddb1e377e0f19dbbc46b8e880cd22cd1280
-
SSDEEP
12288:r+/KiqEaOtfFFjSkxmGlICB54FhVtu/zkHQP8daKBF3Z4mxxJyOjhdIVjG/:CrFayFFWUhuCG0QwU0KBQmXxdSU/
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/3252-61-0x0000000000400000-0x0000000000586000-memory.dmp modiloader_stage2 behavioral2/memory/4292-65-0x0000000000400000-0x0000000000586000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4292 rejoice47.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe File opened for modification C:\Windows\SysWOW64\_rejoice47.exe rejoice47.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4292 set thread context of 4760 4292 rejoice47.exe 89 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 2036 3252 WerFault.exe 82 1588 4292 WerFault.exe 86 2008 4760 WerFault.exe 89 4876 4292 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice47.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4292 3252 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 86 PID 3252 wrote to memory of 4292 3252 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 86 PID 3252 wrote to memory of 4292 3252 ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe 86 PID 4292 wrote to memory of 4760 4292 rejoice47.exe 89 PID 4292 wrote to memory of 4760 4292 rejoice47.exe 89 PID 4292 wrote to memory of 4760 4292 rejoice47.exe 89 PID 4292 wrote to memory of 4760 4292 rejoice47.exe 89 PID 4292 wrote to memory of 4760 4292 rejoice47.exe 89 PID 4292 wrote to memory of 3312 4292 rejoice47.exe 91 PID 4292 wrote to memory of 3312 4292 rejoice47.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec0f0f03dc4b924cf98be8a2b442ffc4_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 3242⤵
- Program crash
PID:2036
-
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 3243⤵
- Program crash
PID:1588
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 244⤵
- Program crash
PID:2008
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4292 -s 6883⤵
- Program crash
PID:4876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3252 -ip 32521⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4292 -ip 42921⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4760 -ip 47601⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4292 -ip 42921⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
785KB
MD5ec0f0f03dc4b924cf98be8a2b442ffc4
SHA13897d2869f1c5e5e63e5a8db2694b31b7cec653a
SHA256b0a561b7d680607d0b08c522e0e45af49aff4389d078f819b4e33a43db586f7f
SHA51210b761e492add4cecd667a3f5944c40d25e19b21ee41924b30f0f27db07c6aeed12add1e891c712fca8659bfb3f94ddb1e377e0f19dbbc46b8e880cd22cd1280