Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 14:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe
-
Size
383KB
-
MD5
050b42da60a781a88c4c8afee5693db2
-
SHA1
96e14f7c114cfaa716ec1b2a54a86008cbec2b79
-
SHA256
57d8f1fc9acb8ec46c3b26b70ad5e1b36479d28ff359a03d1fa998b59f0b2a88
-
SHA512
5f3307ac26253e4ff6d97c00de34db89d7ee9c209a63762fd80a5b24221703b0b69b59fb6409e0a3532377f9847e627c728fcca2377cbc75824accd83a6aaa8a
-
SSDEEP
6144:03DAf8EvG10uPFmdm8lSz+DicdIgI+82aUIFdzvAzKpkYQwJLePcmcxof1eQEr:cDAfRGSucdmQZIt+8ZXAm2YHLYcmcxo+
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/2936-27-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/2936-35-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/1992-37-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral1/memory/1992-39-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1992 Server.exe -
Loads dropped DLL 5 IoCs
pid Process 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 2240 WerFault.exe 2240 WerFault.exe 2240 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\_Server.exe Server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 2452 1992 Server.exe 31 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Server.exe JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe File opened for modification C:\Program Files\Server.exe JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe File created C:\Program Files\Delet.bat JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2240 1992 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1992 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 30 PID 2936 wrote to memory of 1992 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 30 PID 2936 wrote to memory of 1992 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 30 PID 2936 wrote to memory of 1992 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 30 PID 1992 wrote to memory of 2452 1992 Server.exe 31 PID 1992 wrote to memory of 2452 1992 Server.exe 31 PID 1992 wrote to memory of 2452 1992 Server.exe 31 PID 1992 wrote to memory of 2452 1992 Server.exe 31 PID 1992 wrote to memory of 2452 1992 Server.exe 31 PID 1992 wrote to memory of 2452 1992 Server.exe 31 PID 1992 wrote to memory of 2240 1992 Server.exe 32 PID 1992 wrote to memory of 2240 1992 Server.exe 32 PID 1992 wrote to memory of 2240 1992 Server.exe 32 PID 1992 wrote to memory of 2240 1992 Server.exe 32 PID 2936 wrote to memory of 2748 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 34 PID 2936 wrote to memory of 2748 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 34 PID 2936 wrote to memory of 2748 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 34 PID 2936 wrote to memory of 2748 2936 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Server.exe"C:\Program Files\Server.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Delet.bat""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5cf2a51b1abec2913b3d9716074d191ab
SHA1b144b63dcdc2449d5c6db09feadafb7741174957
SHA25631629e97eb53c00bd4c79cff4e759f7840ddd2b9fb6feff1faf839a847a8d352
SHA512cbbc56fcf2cf24aa1f1e31dc18f4f80fe48f788436fe68b9b15c372fec8eb4a00dad189ae95d23badc5c789a1e8dcf924e0b427600ee5c12295941f51c473471
-
Filesize
383KB
MD5050b42da60a781a88c4c8afee5693db2
SHA196e14f7c114cfaa716ec1b2a54a86008cbec2b79
SHA25657d8f1fc9acb8ec46c3b26b70ad5e1b36479d28ff359a03d1fa998b59f0b2a88
SHA5125f3307ac26253e4ff6d97c00de34db89d7ee9c209a63762fd80a5b24221703b0b69b59fb6409e0a3532377f9847e627c728fcca2377cbc75824accd83a6aaa8a