Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:35

General

  • Target

    69770b6980542f2976f2ea92a3bc1d79_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    69770b6980542f2976f2ea92a3bc1d79

  • SHA1

    fb9bfc0c8e1adae6a331e5da3c44ff9888e24c12

  • SHA256

    47fefffd99aae6053725b5d8a99c8ca94030266574d9ba0c172f67a20219da9d

  • SHA512

    57cd869079cf3a13ce8a741dabb7c0a51c049019682528912302ec965e6b17f42a9eab7a005f9b751681c2aed8cc077641627a72506836ad1aba3b9258b2d38e

  • SSDEEP

    6144:eHX1CzH1GARJnC29QJYLw2b6HjNZDU3gqqYg7nIrcWSFY:IgPJV6c6DvU3gqqYmtv2

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
  • ModiLoader Second Stage 57 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69770b6980542f2976f2ea92a3bc1d79_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69770b6980542f2976f2ea92a3bc1d79_JaffaCakes118.exe"
    1⤵
      PID:2036
    • C:\Windows\system32\mshta.exe
      "C:\Windows\system32\mshta.exe" javascript:B8h0uh="Jt";cH51=new%20ActiveXObject("WScript.Shell");ilY1i="8";RV3HF=cH51.RegRead("HKCU\\software\\22EEvu6LGG\\Q6323OJG");EXaM2g7a="qV5";eval(RV3HF);M1YQdiB2="AMizuY2";
      1⤵
      • Process spawned unexpected child process
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:kjrypgk
        2⤵
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2732
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe
          3⤵
          • Looks for VirtualBox Guest Additions in registry
          • Looks for VirtualBox drivers on disk
          • Looks for VMWare Tools registry key
          • Checks BIOS information in registry
          • Deletes itself
          • Adds Run key to start application
          • Maps connected drives based on registry
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\SysWOW64\regsvr32.exe"
            4⤵
              PID:2160

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Virtualization/Sandbox Evasion

      3
      T1497

      Modify Registry

      2
      T1112

      Discovery

      Software Discovery

      1
      T1518

      Query Registry

      4
      T1012

      Virtualization/Sandbox Evasion

      3
      T1497

      File and Directory Discovery

      1
      T1083

      System Information Discovery

      3
      T1082

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        344B

        MD5

        90d72861096976bfb69d8aca0d1e8997

        SHA1

        1edc2b2a86c8288f14261f792499391c1bd7df27

        SHA256

        eb085ac7ec90e8fb784a3bb7cb4bea6f4b4d7118e005b22ae88071145b05efa1

        SHA512

        ee1ad8cb37d58ecc83c4d67cc7c5337abdaf200351bd3346a0472695573dfe2adce41b5f09893ac4989efccb09c6cd9eadf7974caa5e8706f9998327b037dd57

      • C:\Users\Admin\AppData\Local\Temp\Cab9436.tmp
        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\Tar9449.tmp
        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\aa69\926b.e60d8
        Filesize

        32KB

        MD5

        05beb8329d8c32c596a59a24b7931d4d

        SHA1

        0ca1325afd2b89e61732d1991d5d9357a74a8920

        SHA256

        23e86e937678aa71adb291701ff11f3b04b4538fa1e1f0e33a308d7ce8164da8

        SHA512

        a2760810e582f12730a7031be49d52c201ecbb21b264b5c0a45289638be0b66dce9b752079adce35b231c2e55caf1171f79038f760a8d0c1bc0aa0f0cf0c6a2f

      • C:\Users\Admin\AppData\Local\aa69\a926.bat
        Filesize

        64B

        MD5

        47c0742a1b4aa3fdc6c6209b969bad10

        SHA1

        3ee37d10eccc1d0c1f3e57f911b2214d2a94c4a6

        SHA256

        5e8dae5be8cf935f331afaf2809fcdb33a08f62636670f7ce5762adf69070213

        SHA512

        b0ba27c6d215fece0b834ce4639e2a07ec15d7b151176d5875260d8d826d7a9363b5b1f169e21d7e4731d13216ff5c0220bd3f5e9416d47e824c22e7c27bbe2a

      • memory/2036-8-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2036-0-0x0000000000457000-0x0000000000459000-memory.dmp
        Filesize

        8KB

      • memory/2036-55-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2036-7-0x0000000000400000-0x00000000004615F0-memory.dmp
        Filesize

        389KB

      • memory/2036-9-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2036-6-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2036-5-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2036-4-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2036-2-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2036-1-0x0000000000400000-0x00000000004615F0-memory.dmp
        Filesize

        389KB

      • memory/2036-3-0x00000000002D0000-0x00000000003AC000-memory.dmp
        Filesize

        880KB

      • memory/2160-69-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-63-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-64-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-65-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-66-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-68-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-62-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-70-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-71-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-72-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-73-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-67-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2160-61-0x00000000002E0000-0x000000000042A000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-31-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-32-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-50-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-49-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-52-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-48-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-30-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-29-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-28-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-27-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-26-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-25-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-24-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-23-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-22-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-21-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-20-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-51-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-33-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-35-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-36-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-37-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-38-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-47-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-42-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-41-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-40-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-39-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-34-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-19-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-15-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2520-18-0x00000000002B0000-0x00000000003FA000-memory.dmp
        Filesize

        1.3MB

      • memory/2732-17-0x0000000006140000-0x000000000621C000-memory.dmp
        Filesize

        880KB

      • memory/2732-14-0x0000000006140000-0x000000000621C000-memory.dmp
        Filesize

        880KB

      • memory/2732-13-0x0000000004E70000-0x0000000004E71000-memory.dmp
        Filesize

        4KB