Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 09:15
Behavioral task
behavioral1
Sample
JaffaCakes118_640bf366c298739332aad23033e71140.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_640bf366c298739332aad23033e71140.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_640bf366c298739332aad23033e71140.exe
-
Size
813KB
-
MD5
640bf366c298739332aad23033e71140
-
SHA1
71074117459fd673164ad23671ea562135d9a332
-
SHA256
3901541a5e9bba7cbb9715ef7cf7c9272b53040a9bb5da1e2e0000e325795fa0
-
SHA512
957116c818526fc8a71026fffe53d55af71442da27eb99d1dc7120881147d4c21eeaf414e698cbb5109906258d522df47fb7b5d10a36ecae536f3b2c3e75ef63
-
SSDEEP
24576:rquoQkhu+TuVW12Mb5j9fbCZL5XKHtIFc+Z:+JQkgu0W12Mb5j9fKoHF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1768-35-0x0000000000400000-0x00000000004D3000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3020 mr2.exe -
Loads dropped DLL 7 IoCs
pid Process 1768 JaffaCakes118_640bf366c298739332aad23033e71140.exe 1768 JaffaCakes118_640bf366c298739332aad23033e71140.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2692 3020 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_640bf366c298739332aad23033e71140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3020 mr2.exe 2172 DllHost.exe 2172 DllHost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1768 wrote to memory of 3020 1768 JaffaCakes118_640bf366c298739332aad23033e71140.exe 31 PID 1768 wrote to memory of 3020 1768 JaffaCakes118_640bf366c298739332aad23033e71140.exe 31 PID 1768 wrote to memory of 3020 1768 JaffaCakes118_640bf366c298739332aad23033e71140.exe 31 PID 1768 wrote to memory of 3020 1768 JaffaCakes118_640bf366c298739332aad23033e71140.exe 31 PID 3020 wrote to memory of 2692 3020 mr2.exe 33 PID 3020 wrote to memory of 2692 3020 mr2.exe 33 PID 3020 wrote to memory of 2692 3020 mr2.exe 33 PID 3020 wrote to memory of 2692 3020 mr2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640bf366c298739332aad23033e71140.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_640bf366c298739332aad23033e71140.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\mr2.exe"C:\Users\Admin\AppData\Local\Temp\mr2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 2203⤵
- Loads dropped DLL
- Program crash
PID:2692
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5a09d44b1881dcd539821f0aa458d3b69
SHA143ebbc1d190479df278d3b7c5f862158655904b2
SHA256add17a8d83c0862239336a1ca9f892156ee8828c7fcfd4961edf390dc00e8f47
SHA5122c3b26e75ebec69b4b0e124335de751755f887770815acb94321fe705e94e658ac24c2a59f5ef2d1e1103e75af9b13f5625a847b70afd3bb9f6f09cdea85901d
-
Filesize
760KB
MD5aeb5bec4481153729b886a09053fa0ae
SHA135a51d001677dd370c58c745e5bd3eda88b571db
SHA25678321a70b2d57236c44699d74f118fed2ffaab01187ed7ad1c1a61f62d377db4
SHA51291beb363abbab5bd1e6695f4ace0dc0208b6bf74da170e4ec3461714846780fa9c62762c1ce1bba1819ce0871ba38f3d5b1daded7537a03e242a01e9a3d44f70