Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 12:36
Behavioral task
behavioral1
Sample
f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
f406fd52cb701867ec4fb7cc7b3093d4
-
SHA1
fb71afe0f724d0365cbe37759a73f94d3cf287e4
-
SHA256
f89af8b0c99b707f6d37d1734f2b9c8d0618fb33ce3f63624ca70667c9f249b1
-
SHA512
2d162476cfb097d84ea0695ea7382645881812c9b2648e9acb48d3afb3bd98af95fdae6da7a3854633529b9fc7d1037868dfd0ec46df8b579834d6744bac971d
-
SSDEEP
24576:X4/PmqqaRs0ZdPmMEF7PqKqeF8T7T93lWS/5zE/2kbZCLj7T03+XX:XiPdRjZzgWT9osZE/2gWnTZXX
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/files/0x00080000000120fb-1.dat modiloader_stage2 behavioral1/memory/1720-7-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 -
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1720 1.scr -
Loads dropped DLL 1 IoCs
pid Process 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\1.scr f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe File created C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\2010.txt 1.scr -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.scr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1720 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 30 PID 2312 wrote to memory of 1720 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 30 PID 2312 wrote to memory of 1720 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 30 PID 2312 wrote to memory of 1720 2312 f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f406fd52cb701867ec4fb7cc7b3093d4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\1.scr"C:\Program Files\1.scr"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD5d40e4c41c74c7749eabfedd3d99f63fc
SHA1b49a3acfa460bf1bf6cf5546ecf0272aeea248d2
SHA256cb26589e3a1993b45cc748f39f6e2d616bb16aa3e72fa30b36283399f2af16ab
SHA5120421bfdeb7cb11f5d891e5d44848cd69362e2e8e83a441fdf5654bdf9920f212ac5c7947b89df0b63821d8f8def5db41e67af47231193b90f7dc198c473f5ad5