Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 13:49
Behavioral task
behavioral1
Sample
JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe
-
Size
599KB
-
MD5
0e3a331bd3cd562bf4473d42eb9a5707
-
SHA1
22e58180a8f93130efa4b71c6ae042711d2012b5
-
SHA256
a87e0bcdd4799e3fe4e194dc01e5526cf2b7a249ff2e4406aa353c0c0dea0bf3
-
SHA512
4d2a4ca9ad686780e257025f8a1d206f0aae701b3c709d543fb43438a0d98eee80ce1be90b337bc026079b16718d186f286add8bbbece69e180281052bcd86cf
-
SSDEEP
12288:EhEVFbsPUnGAFeB1lOy6m7Ha96V4F3Z4mxx0e1zbUFEx7J:EeUPUGAwB18m7Q6V4QmX0e9bqEH
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/3832-11-0x0000000003350000-0x0000000003450000-memory.dmp modiloader_stage2 behavioral2/memory/3832-26-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 behavioral2/memory/5028-29-0x0000000000400000-0x0000000000513000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/files/0x0009000000023ca4-19.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 5028 smss.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\_smss.exe smss.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\smss.exe JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe File opened for modification C:\Windows\smss.exe JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe File created C:\Windows\ReDelBat.bat JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2720 5028 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3832 wrote to memory of 5028 3832 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 83 PID 3832 wrote to memory of 5028 3832 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 83 PID 3832 wrote to memory of 5028 3832 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 83 PID 5028 wrote to memory of 708 5028 smss.exe 84 PID 5028 wrote to memory of 708 5028 smss.exe 84 PID 3832 wrote to memory of 4680 3832 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 88 PID 3832 wrote to memory of 4680 3832 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 88 PID 3832 wrote to memory of 4680 3832 JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3a331bd3cd562bf4473d42eb9a5707.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\smss.exeC:\Windows\smss.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\program files\internet explorer\IexplOrE.ExE"C:\program files\internet explorer\IexplOrE.ExE"3⤵PID:708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 6963⤵
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\ReDelBat.bat2⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5028 -ip 50281⤵PID:3496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5153d9ee3ef1420fa68e2eb19639aada6
SHA108d98e597a593fa780faf36dc3a8d7d60a4f8b3c
SHA25609e56f33a6459d27778144e43ad6fb9013f51eaa11a7a4d319932e46d2d47ad2
SHA512e5fe5e1012ce34fbaf8f4e9dc474e7adc0870b557c74b6a07ac57088631f5664cafb1e84e1f670326af7865d7c0d35adb98de6cb3600642ec53664d3bb125497
-
Filesize
599KB
MD50e3a331bd3cd562bf4473d42eb9a5707
SHA122e58180a8f93130efa4b71c6ae042711d2012b5
SHA256a87e0bcdd4799e3fe4e194dc01e5526cf2b7a249ff2e4406aa353c0c0dea0bf3
SHA5124d2a4ca9ad686780e257025f8a1d206f0aae701b3c709d543fb43438a0d98eee80ce1be90b337bc026079b16718d186f286add8bbbece69e180281052bcd86cf