Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 16:24

General

  • Target

    427278bb85bd4bee9728a81c1142e8bd_JaffaCakes118.exe

  • Size

    844KB

  • MD5

    427278bb85bd4bee9728a81c1142e8bd

  • SHA1

    14f126955f40611c7372b2960959addc545fdcb9

  • SHA256

    0d976292b61899eba6cf301510d7fd01c3ead27d53722cacb627127ed39c228d

  • SHA512

    41ccc858d28d82c5d683e67bfd9a07136a292ed6699c43b141113de3bd0e47f9226537d4e327b2149c3db7d5c3556e9ac884a384edfc67396e21954de71c54ad

  • SSDEEP

    24576:kV5gTJ2ftYP9vjXoSs5N09WWdcnxkjn14YMAi:k3sLjX32N6WWsYli

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\427278bb85bd4bee9728a81c1142e8bd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\427278bb85bd4bee9728a81c1142e8bd_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 388
      2⤵
      • Program crash
      PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2092-0-0x0000000000400000-0x00000000005DF000-memory.dmp

    Filesize

    1.9MB

  • memory/2092-1-0x0000000000401000-0x000000000041C000-memory.dmp

    Filesize

    108KB

  • memory/2092-2-0x0000000000400000-0x00000000005DF000-memory.dmp

    Filesize

    1.9MB