Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe
-
Size
57KB
-
MD5
f3e0c7308f933365b61bb899ec2f2c43
-
SHA1
e1c651107b06ded92183b27e349a2e403574ad31
-
SHA256
ce4625b42cf8f73d54b9c511fda207b68854debd8f2340d1d76113d9c03e893a
-
SHA512
48407def86dccb9a570d156f64542af7371d11d7c0b22ec4815041cb940df38eeb7225b376e766356c7e1a6dcf7ac7b0554eb3ca1ec9628e5f9d29723df0653f
-
SSDEEP
768:1IRbFW5xQO+/JVHRo71DuSV7pNzkoT7wxeu5qBcE7JhC4z/3KKnDw239q+/bZ43i:OsqFtRq1DuS5zhwxeuc5jzyPGmi
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/392-6-0x0000000010000000-0x0000000010021000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2844 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.dll f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 392 set thread context of 2380 392 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 392 wrote to memory of 2380 392 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 29 PID 392 wrote to memory of 2380 392 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 29 PID 392 wrote to memory of 2380 392 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 29 PID 392 wrote to memory of 2380 392 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 29 PID 392 wrote to memory of 2380 392 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 29 PID 392 wrote to memory of 2380 392 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 29 PID 2380 wrote to memory of 2944 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2944 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2944 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2944 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2944 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2944 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2944 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2844 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2844 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2844 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 32 PID 2380 wrote to memory of 2844 2380 f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe 32 PID 2944 wrote to memory of 2936 2944 cmd.exe 35 PID 2944 wrote to memory of 2936 2944 cmd.exe 35 PID 2944 wrote to memory of 2936 2944 cmd.exe 35 PID 2944 wrote to memory of 2936 2944 cmd.exe 35 PID 2944 wrote to memory of 2936 2944 cmd.exe 35 PID 2944 wrote to memory of 2936 2944 cmd.exe 35 PID 2944 wrote to memory of 2936 2944 cmd.exe 35 PID 2844 wrote to memory of 2636 2844 cmd.exe 34 PID 2844 wrote to memory of 2636 2844 cmd.exe 34 PID 2844 wrote to memory of 2636 2844 cmd.exe 34 PID 2844 wrote to memory of 2636 2844 cmd.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2636 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259535322_install.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Windows\system32\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.dll,InstallSB NtmsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\\259535649_selfdel.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\attrib.exeattrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\f3e0c7308f933365b61bb899ec2f2c43_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5011d37e506cf2e584ad5e2669a1f09d3
SHA144b0ade138e4d2bc86afabb36f990a83b85ae4b4
SHA25657e7e06bbfd3daf4deeddb37c34a30a13e6253cc0ff9cc9a7c042333f2109af9
SHA51289dac1542da68368aceff596428fbdc5d7779453cf7072e91eeb2889c86301560ef320aa535b7406670400cc64c5e3feff64431309fed31f1a8da6915ef6599e
-
Filesize
346B
MD56aa0fc0984968a6450e1dccbd6ad32ac
SHA1e4323010a8845ca57028be8f608250f71a25d0c1
SHA256ddec168c1d7863694646db0916cb02e8a9b332da73f2e108959dd7931022fe33
SHA512fef18149102aac942fe0ed814e6bf1e5ac0d48e86dc6513f7aee242531c7e4aef81feb8ae19486ee6f184001a3295ec1280a56a26804a185c767ab54c8e7416e
-
Filesize
20B
MD56551b8bf0ed982e15cc6022849e385f3
SHA154e502e3ebf60ee0dde3ed4eb556b742d0e22d5f
SHA256e339144e57071fd9db78cc24e9c7302fc7f09162bbe743ead6241d9fecbb7196
SHA51285a5cb9980020fada99aba6f8d727457ed676ab0ba206b4560f9168a6e6818f729ebf61882b28825bc2b9fb8f4113ed8f7393755c61f4d1ad05d4e4e8ebbc5e1