Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 12:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe
-
Size
1.0MB
-
MD5
56942163db21e0409b92fc16c5f40d03
-
SHA1
c92f50c8c3f425fa2a53242d4b2795f55afcb684
-
SHA256
7589ceea4574effa89e246b33c3660a1e1cc0ae80874b22207de4343511a372e
-
SHA512
b0f2250cc9e29b2961266affc98bc99e530f4303361a690b46536bcbaa28d9dcb432b897522eb9e843b894c313aba603ae5b42688d5ad2c340c3971c2d7ecdec
-
SSDEEP
24576:O9sFUm6PN/7+6Qsz5Y4nOcCCKQmXri2kGsdGbhkP:Y1m6PNT+6Qs9OchrmuP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2908-76-0x0000000000400000-0x00000000004D1000-memory.dmp modiloader_stage2 -
Executes dropped EXE 3 IoCs
pid Process 2796 1.exe 2616 SCRAMB~1.EXE 2908 temp.exe -
Loads dropped DLL 6 IoCs
pid Process 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 2796 1.exe 2616 SCRAMB~1.EXE 2616 SCRAMB~1.EXE 2908 temp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"F:\\msdownld.tmp\\IXP000.TMP\\\"" 1.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 1.exe File opened (read-only) \??\B: 1.exe File opened (read-only) \??\E: 1.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\1.jpg JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCRAMB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2796 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 30 PID 1740 wrote to memory of 2796 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 30 PID 1740 wrote to memory of 2796 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 30 PID 1740 wrote to memory of 2796 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 30 PID 1740 wrote to memory of 2796 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 30 PID 1740 wrote to memory of 2796 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 30 PID 1740 wrote to memory of 2796 1740 JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe 30 PID 2796 wrote to memory of 2616 2796 1.exe 31 PID 2796 wrote to memory of 2616 2796 1.exe 31 PID 2796 wrote to memory of 2616 2796 1.exe 31 PID 2796 wrote to memory of 2616 2796 1.exe 31 PID 2796 wrote to memory of 2616 2796 1.exe 31 PID 2796 wrote to memory of 2616 2796 1.exe 31 PID 2796 wrote to memory of 2616 2796 1.exe 31 PID 2616 wrote to memory of 2908 2616 SCRAMB~1.EXE 32 PID 2616 wrote to memory of 2908 2616 SCRAMB~1.EXE 32 PID 2616 wrote to memory of 2908 2616 SCRAMB~1.EXE 32 PID 2616 wrote to memory of 2908 2616 SCRAMB~1.EXE 32 PID 2616 wrote to memory of 2908 2616 SCRAMB~1.EXE 32 PID 2616 wrote to memory of 2908 2616 SCRAMB~1.EXE 32 PID 2616 wrote to memory of 2908 2616 SCRAMB~1.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56942163db21e0409b92fc16c5f40d03.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\program files\common files\microsoft shared\msinfo\1.exe"C:\program files\common files\microsoft shared\msinfo\1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
F:\msdownld.tmp\IXP000.TMP\SCRAMB~1.EXEF:\msdownld.tmp\IXP000.TMP\SCRAMB~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
685KB
MD5cb91cdde00b2b14457452ce500a1464c
SHA155cb59431b6ef3674807685eaee850cbebca70a9
SHA2567fa395ea70bceace2ef09ce951f552037ee7be40e60d7a73c14f369c2f481881
SHA51294470f2135cfbc5d6c31b38906cac41b462c6c5ada0089cd51cdcf00a920ecf91aea7dc5e2ac3728586837b75b78ebd234ec31d7594b0f03d19df18f6d9bdd21
-
Filesize
1.0MB
MD58e96ae1689c8304b0e7e4471c59a4af4
SHA1ebb92e313266b1c3e46365a1760f059762fc6aaa
SHA256ec841c7c5be91900df380af0243c6454e5f3f085a29cea2e13817cb887d35fc9
SHA5129daec4d1053e154e0fa0621bf03edcdfc45227b4f9ee293dcacd5fc61884d55621d64e6c68b356c475f2d6445a769d52571625caf1aec3d3daff40bf10b0e10f
-
Filesize
737KB
MD514062d42b65c1ab7affd8c156e5e9244
SHA1459a296b77c98f3bf76166a0c7b85d83fd5bfa0d
SHA256279005932ed768eca5d8426f8b7905dc04a66527defafbe55d09d6352606f023
SHA51266632b2e0e694087a52db63b7a446543c01db20839ada59f258f801963b985363b13ace3438f52ccb8e4a7d8f5cdbc241afdabd4aee8cb1b3ecd210a3ef3686f