Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 13:49
Behavioral task
behavioral1
Sample
JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe
-
Size
599KB
-
MD5
0e3a331bd3cd562bf4473d42eb9a5707
-
SHA1
22e58180a8f93130efa4b71c6ae042711d2012b5
-
SHA256
a87e0bcdd4799e3fe4e194dc01e5526cf2b7a249ff2e4406aa353c0c0dea0bf3
-
SHA512
4d2a4ca9ad686780e257025f8a1d206f0aae701b3c709d543fb43438a0d98eee80ce1be90b337bc026079b16718d186f286add8bbbece69e180281052bcd86cf
-
SSDEEP
12288:EhEVFbsPUnGAFeB1lOy6m7Ha96V4F3Z4mxx0e1zbUFEx7J:EeUPUGAwB18m7Q6V4QmX0e9bqEH
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral1/memory/3032-30-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 behavioral1/memory/3032-45-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 behavioral1/memory/2500-47-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 behavioral1/memory/2500-48-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/files/0x000b000000012280-26.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2500 smss.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\_smss.exe smss.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\smss.exe JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe File opened for modification C:\Windows\smss.exe JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe File created C:\Windows\ReDelBat.bat JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2484 2500 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2500 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 30 PID 3032 wrote to memory of 2500 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 30 PID 3032 wrote to memory of 2500 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 30 PID 3032 wrote to memory of 2500 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 30 PID 2500 wrote to memory of 2484 2500 smss.exe 31 PID 2500 wrote to memory of 2484 2500 smss.exe 31 PID 2500 wrote to memory of 2484 2500 smss.exe 31 PID 2500 wrote to memory of 2484 2500 smss.exe 31 PID 3032 wrote to memory of 2944 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 33 PID 3032 wrote to memory of 2944 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 33 PID 3032 wrote to memory of 2944 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 33 PID 3032 wrote to memory of 2944 3032 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\smss.exeC:\Windows\smss.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 3003⤵
- Program crash
PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ReDelBat.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5153d9ee3ef1420fa68e2eb19639aada6
SHA108d98e597a593fa780faf36dc3a8d7d60a4f8b3c
SHA25609e56f33a6459d27778144e43ad6fb9013f51eaa11a7a4d319932e46d2d47ad2
SHA512e5fe5e1012ce34fbaf8f4e9dc474e7adc0870b557c74b6a07ac57088631f5664cafb1e84e1f670326af7865d7c0d35adb98de6cb3600642ec53664d3bb125497
-
Filesize
599KB
MD50e3a331bd3cd562bf4473d42eb9a5707
SHA122e58180a8f93130efa4b71c6ae042711d2012b5
SHA256a87e0bcdd4799e3fe4e194dc01e5526cf2b7a249ff2e4406aa353c0c0dea0bf3
SHA5124d2a4ca9ad686780e257025f8a1d206f0aae701b3c709d543fb43438a0d98eee80ce1be90b337bc026079b16718d186f286add8bbbece69e180281052bcd86cf