Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 00:32

General

  • Target

    01722647475d5e9cc01a105dbaa2e979_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    01722647475d5e9cc01a105dbaa2e979

  • SHA1

    5e855c25f769f4ca1eb471b724bfe9bb26442bfb

  • SHA256

    558dd090d548d4fa192d65533fc151b509ea7fc852fbeb16e3c43813b22faee2

  • SHA512

    649d999fa4d57d8929bce9c8fe301979b671f0951aef0d22355daba823b6e9df37c49d6aaa2d92190e34d6c096316ed4d7424562cb68974ce99ed2b5a8049753

  • SSDEEP

    1536:XVtksz1n+yGk3oYyIoP6moZkD+ucrwWkGJq0L11t35EMlII6L/PzqI1QKJRoA:DzbG4D5oPYZkOkne11fh56L/PZJ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01722647475d5e9cc01a105dbaa2e979_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\01722647475d5e9cc01a105dbaa2e979_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c DelMe.bat
      2⤵
        PID:4660
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k krnlsrvc
      1⤵
        PID:1848
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\SysWOW64\svchost.exe -k krnlsrvc
        1⤵
        • Loads dropped DLL
        PID:2340

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Server Software Component

      1
      T1505

      Terminal Services DLL

      1
      T1505.005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DelMe.bat
        Filesize

        212B

        MD5

        8a646850002bfdbd177d3b955a38492c

        SHA1

        c664d157c7e0b549dce96d981d0ede7457d14618

        SHA256

        17902d4338801ce526b1b29198ed8a6661e07701216c4c1f2e5bd5e2b82069c6

        SHA512

        8f46ed69d3c6bf82ead84948b499ef9b212c3f45c5b3bf29116bde57306e2abe1853a83bd5fec3ecc0803875d0b5b0f30869abc5571df0f18ee2a1385ef361c0

      • \??\c:\windows\SysWOW64\jksing.dll
        Filesize

        89KB

        MD5

        c45976cd1f5399142dbdd0efc41f5488

        SHA1

        932f68be5c97cb95978b29145077c4b0fbd340ab

        SHA256

        2cc40038aaf08362a07820653496ac8433956448148b7cdd3939be180ddfa815

        SHA512

        ca8717c1f6b950f810b5c99138fd597346925b755b12277810d7988aeba345a4da2aaecdc7654e46e21365569af59c7c07d23f2c98ed377ea08b99eaff273255

      • memory/2340-7-0x0000000000400000-0x0000000000465000-memory.dmp
        Filesize

        404KB

      • memory/2340-10-0x0000000000400000-0x0000000000465000-memory.dmp
        Filesize

        404KB

      • memory/4540-0-0x0000000000400000-0x0000000000459000-memory.dmp
        Filesize

        356KB

      • memory/4540-8-0x0000000000400000-0x0000000000459000-memory.dmp
        Filesize

        356KB