Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 16:00

General

  • Target

    07874d410220c5323e6498d0fca9957a_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    07874d410220c5323e6498d0fca9957a

  • SHA1

    da0da1a96ca64294c2f9b4e474d6089049a39d2c

  • SHA256

    51953ca0ee18ee80c607d6aa9211a8e83f96b5a8d708d0ccae3e01fa276cf751

  • SHA512

    12c49d05fda483da80ca3a1c75b8bee30d261883849f78637904841a007ef5ad2d1f350b199c8215f984cfe29abd57ab6b85cf285c37b5081132785c113d0761

  • SSDEEP

    49152:kiBtH0ffBx1IfIFAW6kQh0z4DOA7GVaTOmuJXuUjJZdKkIp:/mfL1PFck0DO98ZulvKkI

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 15 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 16 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07874d410220c5323e6498d0fca9957a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07874d410220c5323e6498d0fca9957a_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2664-0-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-2-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2664-1-0x0000000002020000-0x0000000002170000-memory.dmp

    Filesize

    1.3MB

  • memory/2664-3-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-4-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-5-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-6-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2664-7-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-8-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-9-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-10-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-11-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-12-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-13-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-14-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-15-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-16-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-17-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB

  • memory/2664-18-0x0000000000400000-0x0000000000821000-memory.dmp

    Filesize

    4.1MB