Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe
-
Size
449KB
-
MD5
1b68c1b28122776e25be7d01e29aba23
-
SHA1
aa865b99291d7630910ece3f956d32fec2626d85
-
SHA256
dcadfd906850de7d6c5574d66fbef10485fdaa84429e7fb974f24cf0e9170a66
-
SHA512
20f10c29a5a3ce56f4989cb946c1deb973f25a9c235f605999981cdf00c5b6d7b419b519c02bd3dee1df93513b996ba2b8ab491a3642c56f26cdfdf2dbbf35cb
-
SSDEEP
12288:RMAOOl1nD7UHf5Zm46GByHmYetaIEWYRB3lpov:RrXncHf5k46MYmRaTWYdpo
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 11 IoCs
Processes:
resource yara_rule behavioral2/memory/4536-4-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4536-5-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4536-18-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4536-17-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4536-6-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4536-22-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4412-25-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4412-28-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4412-29-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4536-32-0x0000000000400000-0x0000000000551500-memory.dmp modiloader_stage2 behavioral2/memory/4536-33-0x0000000000401000-0x00000000004E1000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
rejoice46.exepid process 4412 rejoice46.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exedescription ioc process File opened (read-only) \??\T: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\U: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\W: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\Y: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\B: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\J: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\K: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\Q: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\S: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\V: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\E: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\G: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\N: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\R: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\L: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\O: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\X: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\Z: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\P: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\A: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\H: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\I: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened (read-only) \??\M: 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exedescription ioc process File created C:\AutoRun.inf 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened for modification C:\AutoRun.inf 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File created F:\AutoRun.inf 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened for modification F:\AutoRun.inf 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
Processes:
rejoice46.exedescription ioc process File created C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe File opened for modification C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rejoice46.exedescription pid process target process PID 4412 set thread context of 3748 4412 rejoice46.exe calc.exe -
Drops file in Program Files directory 3 IoCs
Processes:
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 456 3748 WerFault.exe calc.exe -
Modifies registry class 6 IoCs
Processes:
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exerejoice46.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key rejoice46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ rejoice46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" rejoice46.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exerejoice46.exedescription pid process target process PID 4536 wrote to memory of 4412 4536 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe rejoice46.exe PID 4536 wrote to memory of 4412 4536 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe rejoice46.exe PID 4536 wrote to memory of 4412 4536 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe rejoice46.exe PID 4412 wrote to memory of 3748 4412 rejoice46.exe calc.exe PID 4412 wrote to memory of 3748 4412 rejoice46.exe calc.exe PID 4412 wrote to memory of 3748 4412 rejoice46.exe calc.exe PID 4412 wrote to memory of 3748 4412 rejoice46.exe calc.exe PID 4412 wrote to memory of 3748 4412 rejoice46.exe calc.exe PID 4412 wrote to memory of 2464 4412 rejoice46.exe IEXPLORE.EXE PID 4412 wrote to memory of 2464 4412 rejoice46.exe IEXPLORE.EXE PID 4536 wrote to memory of 3360 4536 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe cmd.exe PID 4536 wrote to memory of 3360 4536 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe cmd.exe PID 4536 wrote to memory of 3360 4536 1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b68c1b28122776e25be7d01e29aba23_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 124⤵
- Program crash
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3748 -ip 37481⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.batFilesize
212B
MD5e0460ce329af17c683546941917cc090
SHA1f65f3356ee64143e0e1c9b408e968916f98f44a7
SHA25637324d2f6dce7366401c80e8d209986abfec1ebd7702e0774a4023c7d9a5d5fa
SHA5124407a1c33ebef1cc89a45b8feb26e9384387c4cc0dee5b6693b85aba48b8220c5f7b294daf8a4a91022197562d4323cdaa94acb30ceb2bd8c47ade4cb47086f4
-
F:\rejoice46.exeFilesize
449KB
MD51b68c1b28122776e25be7d01e29aba23
SHA1aa865b99291d7630910ece3f956d32fec2626d85
SHA256dcadfd906850de7d6c5574d66fbef10485fdaa84429e7fb974f24cf0e9170a66
SHA51220f10c29a5a3ce56f4989cb946c1deb973f25a9c235f605999981cdf00c5b6d7b419b519c02bd3dee1df93513b996ba2b8ab491a3642c56f26cdfdf2dbbf35cb
-
memory/3748-26-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/4412-25-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4412-28-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4412-29-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-17-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-4-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-3-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-6-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-22-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-2-0x0000000000401000-0x00000000004E1000-memory.dmpFilesize
896KB
-
memory/4536-1-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-18-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-5-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-32-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB
-
memory/4536-33-0x0000000000401000-0x00000000004E1000-memory.dmpFilesize
896KB
-
memory/4536-0-0x0000000000400000-0x0000000000551500-memory.dmpFilesize
1.3MB