Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe
-
Size
706KB
-
MD5
581599111559af39d587c0a4ad7aec3c
-
SHA1
d4e5df9dbbb4ebc771b8335447db604e8f2fcd1f
-
SHA256
4bcbf3e1b8db650034045a3051c43678b90401525bb002c11b797b099e633166
-
SHA512
7664b7a8caf5f6088c733e71a0c62fd2462700e0d2dc68f95d0ef83701b3773156bd95afcf5a0c60a8afa4fdc925a487a6bdd1600067af686352749d900757a0
-
SSDEEP
12288:yrnDkr9EJIoNEiFEtCNVPMNbEziKR/60LF3Z4mxxYLPOwjLNkf4:ybAGhNEtCN2mjRPLQmXYawXNkg
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2728-45-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2728 0.exe -
Loads dropped DLL 2 IoCs
pid Process 2784 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 2784 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 2628 2728 0.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 480 Process not Found -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2728 2784 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 30 PID 2784 wrote to memory of 2728 2784 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 30 PID 2784 wrote to memory of 2728 2784 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 30 PID 2784 wrote to memory of 2728 2784 JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe 30 PID 2728 wrote to memory of 2628 2728 0.exe 31 PID 2728 wrote to memory of 2628 2728 0.exe 31 PID 2728 wrote to memory of 2628 2728 0.exe 31 PID 2728 wrote to memory of 2628 2728 0.exe 31 PID 2728 wrote to memory of 2628 2728 0.exe 31 PID 2728 wrote to memory of 2628 2728 0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_581599111559af39d587c0a4ad7aec3c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\0.exe"C:\Users\Admin\AppData\Local\Temp\0.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD52911f6bcf6fd263da5b002490eda4c23
SHA1a3722256d39831c40bf96fb8c44a9f59edc61c8c
SHA25674a76cdefbbd32339a31e45a5ffa87df15e92e03902de528a1c5c0dcd25f2b2e
SHA51229f9d0e8dc376a1574fe00cd8b9ac973779a7744e8cf668bc07ba4b7919baf49f4874f2033830519d13c7cd2f1cf668fa8c089c09accff0d66850d0a872b710f