Analysis

  • max time kernel
    141s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 22:48

General

  • Target

    09ece6119a134cb32145ae3c6e75cb1e_JaffaCakes118.exe

  • Size

    557KB

  • MD5

    09ece6119a134cb32145ae3c6e75cb1e

  • SHA1

    9f59e48647457d5dd1e2abe21fc2cc4c92b22e1a

  • SHA256

    0a127eb252be79162eb8dd92b000d4a5ec3420d2a2995e33e5847a1b07b27be6

  • SHA512

    f9191c8149a624e56cd1512073ff2eb7a11bed81566863679c59750df19207ff1820a372164f0e3849080bc6150060ebdb6ae30b487366cf17ed66d192f72a80

  • SSDEEP

    12288:BV33t74esz3lG5A26fsx8QQGy2mklJU9jJeauHC64k:BV3Ce2VoA26k/1JcQauiPk

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09ece6119a134cb32145ae3c6e75cb1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09ece6119a134cb32145ae3c6e75cb1e_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Windows\SysWOW64\zp.exe
      C:\Windows\system32\zp.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:1568
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\SetupDel.bat
      2⤵
        PID:4268
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3920 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2984

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\SetupDel.bat

        Filesize

        212B

        MD5

        c1f70305b3b1f3895e9229d6778bad56

        SHA1

        d9c38cf2cf79bcdbc6d2a1507af0403a68308af1

        SHA256

        fd81ddfe71d07d972e6bf1e50676114f362c0863f9ffd674ef1ed84598ef1a9f

        SHA512

        b1313d5f8fe26937f5fea7bc3237fc36c79b9fc995a5f92af2ff1df83430126e864317624b3ae651b7133f29ff22cc2047aee65d1ebee1dce01477afaa635a71

      • C:\Windows\SysWOW64\zp.exe

        Filesize

        557KB

        MD5

        09ece6119a134cb32145ae3c6e75cb1e

        SHA1

        9f59e48647457d5dd1e2abe21fc2cc4c92b22e1a

        SHA256

        0a127eb252be79162eb8dd92b000d4a5ec3420d2a2995e33e5847a1b07b27be6

        SHA512

        f9191c8149a624e56cd1512073ff2eb7a11bed81566863679c59750df19207ff1820a372164f0e3849080bc6150060ebdb6ae30b487366cf17ed66d192f72a80

      • memory/1568-23-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/1568-21-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/1568-20-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/1568-18-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/1568-19-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-5-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-11-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-8-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-16-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-7-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-6-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-0-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-4-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-22-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-3-0x000000000054E000-0x0000000000594000-memory.dmp

        Filesize

        280KB

      • memory/4444-27-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB

      • memory/4444-1-0x0000000000400000-0x00000000005DB000-memory.dmp

        Filesize

        1.9MB