Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 07:57

General

  • Target

    0430e14e4b1bf9445c18b0512c534e2a_JaffaCakes118.exe

  • Size

    21KB

  • MD5

    0430e14e4b1bf9445c18b0512c534e2a

  • SHA1

    45dacee7f66988e857cd5ee46f7e7251ea98ea8e

  • SHA256

    c8b0b734c6e4b9123e98ed60c823f9afd8c4e90132511b596668995ed6df231f

  • SHA512

    93d544bfe4f287a24200e5c12fc735cab74a9489dc6344f126daabcb8f0490adb9d6f01294398fd4c643a65a0aa6fba423e41dcfcdbc0dd1d694ebd9f630966c

  • SSDEEP

    384:YgNoGOuaUXDsC2//NDyPx9Qz1FLMBiwwNnGMZbhQq+eVCb3H:7NokTSnNDyPx9G1HwSRZNQq+eVCb3H

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3416
      • C:\Users\Admin\AppData\Local\Temp\0430e14e4b1bf9445c18b0512c534e2a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\0430e14e4b1bf9445c18b0512c534e2a_JaffaCakes118.exe"
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4392
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\system32\del.bat
          3⤵
            PID:4756
      • C:\Windows\SysWOW64\tcpip.exe
        C:\Windows\SysWOW64\tcpip.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2176

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\del.bat

        Filesize

        210B

        MD5

        ea5df0f807b968ee5a6c7de831ec648c

        SHA1

        6f0acbfc69058b692ba13f4730e2dcff4512173e

        SHA256

        fb313f020aad138508e493f9ff9608c41e43bad73e45c95806251d247a1ee152

        SHA512

        aeeda6b21f6c63b312a91dcaca06882bcd17f599db1aed4f69df38176b13d2aef651129737abe9d8f0121af0af6d6184bdcf31a1c1bf3c1b9115495f97a519c3

      • C:\Windows\SysWOW64\tcpip.exe

        Filesize

        21KB

        MD5

        0430e14e4b1bf9445c18b0512c534e2a

        SHA1

        45dacee7f66988e857cd5ee46f7e7251ea98ea8e

        SHA256

        c8b0b734c6e4b9123e98ed60c823f9afd8c4e90132511b596668995ed6df231f

        SHA512

        93d544bfe4f287a24200e5c12fc735cab74a9489dc6344f126daabcb8f0490adb9d6f01294398fd4c643a65a0aa6fba423e41dcfcdbc0dd1d694ebd9f630966c

      • memory/2176-5-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/2176-6-0x0000000000660000-0x000000000066C000-memory.dmp

        Filesize

        48KB

      • memory/2176-12-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4392-0-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/4392-1-0x0000000000760000-0x0000000000761000-memory.dmp

        Filesize

        4KB

      • memory/4392-9-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB