Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 14:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe
-
Size
383KB
-
MD5
050b42da60a781a88c4c8afee5693db2
-
SHA1
96e14f7c114cfaa716ec1b2a54a86008cbec2b79
-
SHA256
57d8f1fc9acb8ec46c3b26b70ad5e1b36479d28ff359a03d1fa998b59f0b2a88
-
SHA512
5f3307ac26253e4ff6d97c00de34db89d7ee9c209a63762fd80a5b24221703b0b69b59fb6409e0a3532377f9847e627c728fcca2377cbc75824accd83a6aaa8a
-
SSDEEP
6144:03DAf8EvG10uPFmdm8lSz+DicdIgI+82aUIFdzvAzKpkYQwJLePcmcxof1eQEr:cDAfRGSucdmQZIt+8ZXAm2YHLYcmcxo+
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/468-15-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 behavioral2/memory/3452-16-0x0000000000400000-0x0000000000527000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 468 Server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\_Server.exe Server.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 468 set thread context of 1888 468 Server.exe 84 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Server.exe JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe File opened for modification C:\Program Files\Server.exe JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe File created C:\Program Files\Delet.bat JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1100 1888 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3452 wrote to memory of 468 3452 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 83 PID 3452 wrote to memory of 468 3452 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 83 PID 3452 wrote to memory of 468 3452 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 83 PID 468 wrote to memory of 1888 468 Server.exe 84 PID 468 wrote to memory of 1888 468 Server.exe 84 PID 468 wrote to memory of 1888 468 Server.exe 84 PID 468 wrote to memory of 1888 468 Server.exe 84 PID 468 wrote to memory of 1888 468 Server.exe 84 PID 468 wrote to memory of 1868 468 Server.exe 86 PID 468 wrote to memory of 1868 468 Server.exe 86 PID 3452 wrote to memory of 1256 3452 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 87 PID 3452 wrote to memory of 1256 3452 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 87 PID 3452 wrote to memory of 1256 3452 JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_050b42da60a781a88c4c8afee5693db2.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Program Files\Server.exe"C:\Program Files\Server.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 124⤵
- Program crash
PID:1100
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Delet.bat""2⤵
- System Location Discovery: System Language Discovery
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1888 -ip 18881⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5cf2a51b1abec2913b3d9716074d191ab
SHA1b144b63dcdc2449d5c6db09feadafb7741174957
SHA25631629e97eb53c00bd4c79cff4e759f7840ddd2b9fb6feff1faf839a847a8d352
SHA512cbbc56fcf2cf24aa1f1e31dc18f4f80fe48f788436fe68b9b15c372fec8eb4a00dad189ae95d23badc5c789a1e8dcf924e0b427600ee5c12295941f51c473471
-
Filesize
383KB
MD5050b42da60a781a88c4c8afee5693db2
SHA196e14f7c114cfaa716ec1b2a54a86008cbec2b79
SHA25657d8f1fc9acb8ec46c3b26b70ad5e1b36479d28ff359a03d1fa998b59f0b2a88
SHA5125f3307ac26253e4ff6d97c00de34db89d7ee9c209a63762fd80a5b24221703b0b69b59fb6409e0a3532377f9847e627c728fcca2377cbc75824accd83a6aaa8a