Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 19:13

General

  • Target

    5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe

  • Size

    280KB

  • MD5

    5d49afb04f975994b70e69480b7b527d

  • SHA1

    354164b34d6f084836883c9539bfd404445a82d3

  • SHA256

    6c279630b853dd65b95b8d43ab3012581aabe928ccbaf0518de40069339b0080

  • SHA512

    28e58066e98657bc0b626e8bf19fe02c6a6052124dc71142dc77246b8a463c47550132ef787a0812e986dc5137e4de09c13377636db332577592aa7edd0cf4fd

  • SSDEEP

    6144:zh0iSvyd1gEs2Iqe5ND/2SIw05mG3J985CW3B0mNXTByHN:6iCEsJqe5JetQG3J95Y0mdNyHN

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SysWOW64\lsassc.exe
      C:\Windows\system32\lsassc.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2728
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Delet.bat
      2⤵
      • Deletes itself
      PID:2624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Delet.bat

    Filesize

    212B

    MD5

    bd5bcc66b9d490e2670f42cd86df9728

    SHA1

    96cd71139d2fb29c48877a1eba46a9fa2e1cd12f

    SHA256

    fa852c42eee07bd60388fa0e00939928988fc51bbf225a394926e19764df6bc9

    SHA512

    d45ab7f7a031c937f0cdfba78265fab8e33245dc40c274261e1e309ddb8092a51fb176f5abca43687cdb54cf131f73ec6255a3b01c73882a1fb25909776620ed

  • \Windows\SysWOW64\lsassc.exe

    Filesize

    280KB

    MD5

    5d49afb04f975994b70e69480b7b527d

    SHA1

    354164b34d6f084836883c9539bfd404445a82d3

    SHA256

    6c279630b853dd65b95b8d43ab3012581aabe928ccbaf0518de40069339b0080

    SHA512

    28e58066e98657bc0b626e8bf19fe02c6a6052124dc71142dc77246b8a463c47550132ef787a0812e986dc5137e4de09c13377636db332577592aa7edd0cf4fd

  • memory/2520-0-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2520-1-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2520-2-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2520-7-0x0000000002F40000-0x000000000304C000-memory.dmp

    Filesize

    1.0MB

  • memory/2520-13-0x0000000002F40000-0x000000000304C000-memory.dmp

    Filesize

    1.0MB

  • memory/2520-25-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2728-22-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB