Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe
-
Size
365KB
-
MD5
fa4a3f11a4f6dec0995b6d08692a175f
-
SHA1
61a13d2666b99c623976d5dede5a8cbbedc88059
-
SHA256
d7c6d8cc6dbe2fb4072756b4c58427303ad62e044e2b9142fdcd3f2dac61f31d
-
SHA512
311c31a70a52899ce9225ea9a4ef475126dc2becfab3be87e3711e163578e9dceb6cd5466f8553165fe9a59281b0fd464814e601b4616dc6b9a6be7aa26ac4b7
-
SSDEEP
6144:B/0uoDXyB5M+4MMLJI0IcaVY8ijYMi9rWYKQc8OA8FNuw/g4Pwkn5vjOL:BJgip4nK1pHiYHhKQSZJ1Pwkn5vjk
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/740-15-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 behavioral1/memory/740-20-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 behavioral1/memory/2852-29-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 behavioral1/memory/2852-34-0x0000000000400000-0x000000000051D000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 740 4.EXE 2852 4.EXE -
Loads dropped DLL 14 IoCs
pid Process 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 740 4.EXE 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2192 WerFault.exe 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 2852 4.EXE 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe 1504 WerFault.exe -
resource yara_rule behavioral1/files/0x00080000000193f7-4.dat vmprotect behavioral1/memory/740-10-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect behavioral1/memory/740-15-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect behavioral1/memory/740-20-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect behavioral1/memory/2524-22-0x0000000002460000-0x000000000257D000-memory.dmp vmprotect behavioral1/memory/2852-28-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect behavioral1/memory/2852-27-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect behavioral1/memory/2852-25-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect behavioral1/memory/2852-29-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect behavioral1/memory/2852-34-0x0000000000400000-0x000000000051D000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2192 740 WerFault.exe 29 1504 2852 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2524 wrote to memory of 740 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 29 PID 2524 wrote to memory of 740 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 29 PID 2524 wrote to memory of 740 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 29 PID 2524 wrote to memory of 740 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 29 PID 2524 wrote to memory of 740 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 29 PID 2524 wrote to memory of 740 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 29 PID 2524 wrote to memory of 740 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 29 PID 740 wrote to memory of 2192 740 4.EXE 30 PID 740 wrote to memory of 2192 740 4.EXE 30 PID 740 wrote to memory of 2192 740 4.EXE 30 PID 740 wrote to memory of 2192 740 4.EXE 30 PID 740 wrote to memory of 2192 740 4.EXE 30 PID 740 wrote to memory of 2192 740 4.EXE 30 PID 740 wrote to memory of 2192 740 4.EXE 30 PID 2524 wrote to memory of 2852 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2852 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2852 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2852 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2852 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2852 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2852 2524 fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe 31 PID 2852 wrote to memory of 1504 2852 4.EXE 32 PID 2852 wrote to memory of 1504 2852 4.EXE 32 PID 2852 wrote to memory of 1504 2852 4.EXE 32 PID 2852 wrote to memory of 1504 2852 4.EXE 32 PID 2852 wrote to memory of 1504 2852 4.EXE 32 PID 2852 wrote to memory of 1504 2852 4.EXE 32 PID 2852 wrote to memory of 1504 2852 4.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 2923⤵
- Loads dropped DLL
- Program crash
PID:2192
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2923⤵
- Loads dropped DLL
- Program crash
PID:1504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD527fab6fe7a175f7c0d13ecf7068b1ca7
SHA1b08ac1a5fa5a4e1443f0c01cc7e89849e58becf4
SHA25674ae32b83b999b4489ac1df26df600ac5ae1d8c7834d738fb1343d04254f84ab
SHA512f5f29bc21ab98bf4c9a282af34578cfa60b0ad1796a1428b2ee84ff4c6c4b08d63865de380c2b2386982a570777f87ef1719d57cab63c65dff4de1ec044dbb74