Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 10:33

General

  • Target

    66f636adfb8c7788221e29a2ad39c36b_JaffaCakes118.exe

  • Size

    261KB

  • MD5

    66f636adfb8c7788221e29a2ad39c36b

  • SHA1

    20b278745d2cf6d2df9688bdd58b4feace76576c

  • SHA256

    32cb28f0b9b96442d26e087c7aa42cc6f2ca47f77042cb055a1e92ef78972f0b

  • SHA512

    7e6b80cc25126d18f636b4fbd2c505b405b73e17ef9f77b5b5f47588420a7b9b348aa081a10bbcc6aeb4048995160eef51a1296967f488738988fb376a044e98

  • SSDEEP

    6144:JkGS17CZemTTwkkbBX5QAVPAjdYmHO40bozYqdtLkx:Jkl4T3wxxlPAjdYiODbYto

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
  • ModiLoader Second Stage 59 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66f636adfb8c7788221e29a2ad39c36b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\66f636adfb8c7788221e29a2ad39c36b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Users\Admin\AppData\Local\Temp\66f636adfb8c7788221e29a2ad39c36b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\66f636adfb8c7788221e29a2ad39c36b_JaffaCakes118.exe"
      2⤵
        PID:2172
    • C:\Windows\system32\mshta.exe
      "C:\Windows\system32\mshta.exe" javascript:GLor3PB5ES="EjxAWX6Rl";N4O=new%20ActiveXObject("WScript.Shell");yHLn8LeL="9YXGGSS6";dK9ph=N4O.RegRead("HKLM\\software\\Wow6432Node\\CIrdB3\\8LKfHGpA6");zMX2dVSkO="XWNVXqz1O5";eval(dK9ph);PTeiCY18="LHb8";
      1⤵
      • Process spawned unexpected child process
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:zemo
        2⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe
          3⤵
          • Looks for VirtualBox Guest Additions in registry
          • Looks for VirtualBox drivers on disk
          • Looks for VMWare Tools registry key
          • Checks BIOS information in registry
          • Deletes itself
          • Drops startup file
          • Adds Run key to start application
          • Maps connected drives based on registry
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2348
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\SysWOW64\regsvr32.exe"
            4⤵
              PID:2696

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\d71742\043bcc.c56af49

        Filesize

        17KB

        MD5

        c2d26776a89d10852ea2758f17881976

        SHA1

        84ae01d2912ba62e80b6e1597b180e8cd671822a

        SHA256

        82df6d38a354bb381a1b82bcf9328649766953587f2a4bbdf9202cbca3cd9976

        SHA512

        b3cb0382930b07806f6559a6bc0d8cb25a4138ff66c0014e9ea940ec6ba808be5b1fb9d9d4a9e894cced29ac8db53d43e3ca9e7215d6b5b2c30c04a1583f91f5

      • C:\Users\Admin\AppData\Local\d71742\cc24ba.lnk

        Filesize

        877B

        MD5

        301db55c13b7cf0607ebd373c5de8317

        SHA1

        5ffd90916dd75842ace23672e845661f79fa7470

        SHA256

        dad1a2d9bbc904394f8b07e93b035aa527ed5b4f3e9d52a94f72be67375c62d5

        SHA512

        a875d6404c82dcf3d6e117fe6de5cae3fc7e0e617047ffd84385dc96f782bea9512edc7b4d505cfab57a9d8b5842cf95fa48b31c594bf4dae14bdf161bf71a15

      • C:\Users\Admin\AppData\Local\d71742\ee03f2.bat

        Filesize

        61B

        MD5

        251c82732dbd03982f565deed73bb4f2

        SHA1

        2f903f60f1946953494fb995438cc2419abe59df

        SHA256

        4b67bfb9575e3dffcba2ad2d0c3b194119b1671d0e079ca9a2ff85b177d438f2

        SHA512

        1c6d1dd21ef660f870e23663b8f895f2255bf43830e93690217124a6b4a8cc563f97a4db145dd247b93bda3d49b7ef9d2ddf4ce58c72eccfb4609a356afd1344

      • C:\Users\Admin\AppData\Roaming\3aef84\6d4792.c56af49

        Filesize

        27KB

        MD5

        29a75ec4785b24589642b5b66d00cba2

        SHA1

        711ede5b8c3dbd69bf48225b63ed13e02223f36c

        SHA256

        24a825f9dc21a4f848d2ca1ad56be827308745a04dd9b7d5f349dbd8d6cafa72

        SHA512

        59f92f830349f37c058034ec3ab650808937c4c85c0b97c18cad6a5488da26b773f8bdde67a0c0bc13f54496bcfb37bb24e798a73d6b619334c40858da588dbc

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\162913.lnk

        Filesize

        987B

        MD5

        e246ed83ce721522198d8c45a8b4bfcb

        SHA1

        3192d16fcfe3b4c0c442e37f1467c54bd8b92325

        SHA256

        ee46488c16a3f2111b007a59898e2530009682ca2bf4cc4179b5d090b7ee7ce4

        SHA512

        0a9fc2402fe2ee160abe6d48b8b8ed707f1d07d5198052d4ad5c7813a5b27d11ec7e8cc41edca907c5945de3a234e07220bffa35376e9afae7a008e8e10cc2dc

      • memory/1932-0-0x0000000000400000-0x000000000040D000-memory.dmp

        Filesize

        52KB

      • memory/2172-10-0x0000000001D40000-0x0000000001E14000-memory.dmp

        Filesize

        848KB

      • memory/2172-11-0x0000000001D40000-0x0000000001E14000-memory.dmp

        Filesize

        848KB

      • memory/2172-8-0x0000000001D40000-0x0000000001E14000-memory.dmp

        Filesize

        848KB

      • memory/2172-7-0x0000000001D40000-0x0000000001E14000-memory.dmp

        Filesize

        848KB

      • memory/2172-9-0x0000000001D40000-0x0000000001E14000-memory.dmp

        Filesize

        848KB

      • memory/2172-12-0x0000000001D40000-0x0000000001E14000-memory.dmp

        Filesize

        848KB

      • memory/2172-13-0x0000000001D40000-0x0000000001E14000-memory.dmp

        Filesize

        848KB

      • memory/2172-6-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2172-5-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2172-3-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2348-55-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-37-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-29-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-30-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-31-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-48-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-49-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-47-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-50-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-46-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-45-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-60-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-59-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-58-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-57-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-56-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-36-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-44-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-43-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-67-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-42-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-41-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-40-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-39-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-38-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-28-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-35-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-34-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-33-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-24-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-26-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2348-32-0x00000000002B0000-0x00000000003EE000-memory.dmp

        Filesize

        1.2MB

      • memory/2488-27-0x0000000005DB0000-0x0000000005E84000-memory.dmp

        Filesize

        848KB

      • memory/2488-23-0x0000000005DB0000-0x0000000005E84000-memory.dmp

        Filesize

        848KB

      • memory/2696-72-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-71-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-78-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-76-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-75-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-73-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-74-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-80-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-70-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-69-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-68-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-82-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-81-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-79-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB

      • memory/2696-77-0x0000000000090000-0x00000000001CE000-memory.dmp

        Filesize

        1.2MB