Analysis

  • max time kernel
    92s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 22:00

General

  • Target

    2661ad0e058765b2e83875fc4ced3f47_JaffaCakes118.exe

  • Size

    257KB

  • MD5

    2661ad0e058765b2e83875fc4ced3f47

  • SHA1

    9b3a2b186d8bdbaddd4adb6e6846bdead32a794c

  • SHA256

    337eb6c64a352aa8a34ec2499035b3339357f77d500f77fd7bd8f030d002da42

  • SHA512

    8750dfc58e445475c1ef46c59f660a0c2b52c2b24e7f2bd35c6f048b48df7aabd69c1dcfb92f66eea79978d5d650ed9c50e8a661b94522a2f37981b818c214af

  • SSDEEP

    6144:6Z5kj0KkgzTmsVYCxAO9wC+cMcKTV6X/65hf8pk4:6v2kgzTmtCxAO0cMcKi/I8y4

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2661ad0e058765b2e83875fc4ced3f47_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2661ad0e058765b2e83875fc4ced3f47_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Users\Admin\AppData\Local\Temp\4444.exe
      "C:\Users\Admin\AppData\Local\Temp\4444.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4444.exe

    Filesize

    183KB

    MD5

    2e178e10658ad79c3b9df262a31df9c2

    SHA1

    f33d9f5cabca878a2c595d094389eb5ff9c630b2

    SHA256

    c30a8539c6b1d4eb5d6fcc8a8664a93026833884127fc9e59512309fcdbc3aea

    SHA512

    fdc0f55cd089ec1f5dcf0ba4ba3b608e81beb0b9c618bdefb181f50560e6f0546054d3b4db247f46f5b2655b2ad882d4c62d9c78ca2653f5d92415ce80377fc4

  • memory/3176-0-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/3176-12-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/4204-13-0x0000000073F02000-0x0000000073F03000-memory.dmp

    Filesize

    4KB

  • memory/4204-14-0x0000000073F00000-0x00000000744B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4204-15-0x0000000073F00000-0x00000000744B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4204-16-0x0000000073F00000-0x00000000744B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4204-18-0x0000000073F00000-0x00000000744B1000-memory.dmp

    Filesize

    5.7MB