Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
19e84aa79c4ce90238c06533b909f9d4
-
SHA1
4c1cfd8877fbc4df83ac224b89e418e7b4792b05
-
SHA256
0bc8f4eb01bdfd0d11d0ebd8deaed30e60908550be9c9668364b21b49c626256
-
SHA512
8b82ca108ce9aa63155e64db7299659c76db6d23266039e3d84acca7c4185834c75a2158283a109610c54306e77acc775e27ab2d8f76dcb14d7fe8173475ef9d
-
SSDEEP
49152:TusnT65I512yIni8ELgAUkkCXXkHss50Ye4AGSZhOwrMrC:TT6ugMLBUkXX+ss50YTcPHr+C
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1452-4-0x0000000000400000-0x0000000000981000-memory.dmp modiloader_stage2 behavioral1/memory/1452-5-0x0000000000400000-0x0000000000981000-memory.dmp modiloader_stage2 -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Wine 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe -
Processes:
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exepid process 1452 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
Processes:
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exepid process 1452 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exedescription pid process target process PID 1452 wrote to memory of 2696 1452 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe IEXPLORE.EXE PID 1452 wrote to memory of 2696 1452 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe IEXPLORE.EXE PID 1452 wrote to memory of 2696 1452 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe IEXPLORE.EXE PID 1452 wrote to memory of 2696 1452 19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19e84aa79c4ce90238c06533b909f9d4_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1452-0-0x0000000000400000-0x0000000000981000-memory.dmpFilesize
5.5MB
-
memory/1452-2-0x0000000000401000-0x0000000000451000-memory.dmpFilesize
320KB
-
memory/1452-4-0x0000000000400000-0x0000000000981000-memory.dmpFilesize
5.5MB
-
memory/1452-5-0x0000000000400000-0x0000000000981000-memory.dmpFilesize
5.5MB