Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 21:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe
-
Size
650KB
-
MD5
2fc84ea98f7f52999dc86b8c0fe39794
-
SHA1
13d203f95c29fafceed414bc7cd9dd3f822f824f
-
SHA256
4b89a52186085a9be48466e83892f41134739688f1575ef28cb2a01a98dc071a
-
SHA512
fa3f2ccb20dacf6674f1699c0c055594c83cb5c95cff667a3ddc7e0a94f4381c957a73c2dc34cac940c5a45bdcbda1d2044cfd5234f1373e1e3f522ad88b9cd0
-
SSDEEP
12288:GpXNBbDvAOb7e7yJLqDWQcTxrXbuutkv/FV9bOI4:QbDn7e2JLPQctDbztkvNbOI4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe ZReload.scr" csrss.exe -
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/296-9-0x0000000013140000-0x00000000131E8000-memory.dmp modiloader_stage2 behavioral1/memory/2752-10-0x0000000013140000-0x00000000131E8000-memory.dmp modiloader_stage2 behavioral1/files/0x000800000001706d-31.dat modiloader_stage2 behavioral1/memory/2752-35-0x0000000013140000-0x00000000131E8000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\services.exe csrss.exe -
Executes dropped EXE 2 IoCs
pid Process 2752 csrss.exe 2680 services.exe -
Loads dropped DLL 2 IoCs
pid Process 2752 csrss.exe 2752 csrss.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\rlog.dllx csrss.exe File opened for modification C:\Windows\SysWOW64\ZReload.scr csrss.exe File created C:\Windows\SysWOW64\ZReload.scrx csrss.exe File created C:\Windows\SysWOW64\Zreload.scr csrss.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\csrss.exe cmd.exe File opened for modification C:\Windows\csrss.exe cmd.exe File opened for modification C:\Windows\csrss.exe csrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 296 wrote to memory of 2692 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 30 PID 296 wrote to memory of 2692 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 30 PID 296 wrote to memory of 2692 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 30 PID 296 wrote to memory of 2692 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 30 PID 296 wrote to memory of 2752 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 32 PID 296 wrote to memory of 2752 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 32 PID 296 wrote to memory of 2752 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 32 PID 296 wrote to memory of 2752 296 JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe 32 PID 2752 wrote to memory of 2680 2752 csrss.exe 33 PID 2752 wrote to memory of 2680 2752 csrss.exe 33 PID 2752 wrote to memory of 2680 2752 csrss.exe 33 PID 2752 wrote to memory of 2680 2752 csrss.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2fc84ea98f7f52999dc86b8c0fe39794.exe" "C:\Windows\csrss.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\csrss.exe"C:\Windows\csrss.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\drivers\services.exeC:\Windows\system32\drivers\services.exe3⤵
- Executes dropped EXE
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD58cfb6b02ab6a839656eae2d2af218d39
SHA16f95718d8575871255dde12a801ec9638945f84e
SHA256794a54e567f644324ee897e7dfd6efe003e21741377ba4d2c57bd4e8afc1b866
SHA512cbfc0068a8f22540bb20f1fc9bd300019dc65b295edbe92bc93c9f9641c8f8e99e047dc0e5e28acb3a82b9ef093fe729f3a97d8fe3d24e63792336af068edd04
-
Filesize
650KB
MD52fc84ea98f7f52999dc86b8c0fe39794
SHA113d203f95c29fafceed414bc7cd9dd3f822f824f
SHA2564b89a52186085a9be48466e83892f41134739688f1575ef28cb2a01a98dc071a
SHA512fa3f2ccb20dacf6674f1699c0c055594c83cb5c95cff667a3ddc7e0a94f4381c957a73c2dc34cac940c5a45bdcbda1d2044cfd5234f1373e1e3f522ad88b9cd0
-
Filesize
25KB
MD517756e0726830df0897875a03d3a5067
SHA1af7783012872089b9a4a9c78daa3eefff12f5e04
SHA256445a24c80b4a85b7efcedd6f75062f317f1c8c6a97cd51dfc3d861909e2e79d3
SHA5122230b77de5d9142254514268c6c23f933bf78a90e15f75de1041828db54616fbb0fcf66b5f3d7bf06a0a5c3474fc040ff25ff582c89de076e17fa16b441b135e