Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 06:00

General

  • Target

    b2074e99f2099166f5487f3b0d2413d6_JaffaCakes118.exe

  • Size

    270KB

  • MD5

    b2074e99f2099166f5487f3b0d2413d6

  • SHA1

    27ba18d3321dd43b2fd972d0527b89e2f3e28ea6

  • SHA256

    5940a848145f1201b5a8247158ea561f61dbfca205f6b26a0479b0e24146291d

  • SHA512

    9144a1e18ab0be6f581be776e155830f0fff9d8802cccd56593813e11a393e47533b007b533d8011add377211e5facee5bad03e8004f9c9aad51d8682ba097cf

  • SSDEEP

    6144:qGyjnBSkuV1d4eZd88ORJIf/wTB4R53cpc:5YnBSkuVUeZdYqwTz

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 16 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2074e99f2099166f5487f3b0d2413d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b2074e99f2099166f5487f3b0d2413d6_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\mstwain32.exe
      "C:\Windows\mstwain32.exe"
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3052

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\mstwain32.exe

          Filesize

          270KB

          MD5

          b2074e99f2099166f5487f3b0d2413d6

          SHA1

          27ba18d3321dd43b2fd972d0527b89e2f3e28ea6

          SHA256

          5940a848145f1201b5a8247158ea561f61dbfca205f6b26a0479b0e24146291d

          SHA512

          9144a1e18ab0be6f581be776e155830f0fff9d8802cccd56593813e11a393e47533b007b533d8011add377211e5facee5bad03e8004f9c9aad51d8682ba097cf

        • memory/2840-0-0x0000000002990000-0x0000000002991000-memory.dmp

          Filesize

          4KB

        • memory/2840-9-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-22-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-28-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-17-0x0000000075210000-0x0000000075211000-memory.dmp

          Filesize

          4KB

        • memory/3052-18-0x0000000075200000-0x00000000752F0000-memory.dmp

          Filesize

          960KB

        • memory/3052-20-0x00000000002F0000-0x00000000002F8000-memory.dmp

          Filesize

          32KB

        • memory/3052-19-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-21-0x0000000000460000-0x000000000046E000-memory.dmp

          Filesize

          56KB

        • memory/3052-14-0x00000000002E0000-0x00000000002E1000-memory.dmp

          Filesize

          4KB

        • memory/3052-25-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-15-0x0000000000460000-0x000000000046E000-memory.dmp

          Filesize

          56KB

        • memory/3052-31-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-34-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-37-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-40-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-43-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-46-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-49-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-52-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-55-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/3052-58-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB