Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 12:59

General

  • Target

    6345907153d820edf8402066bb70732f_JaffaCakes118.exe

  • Size

    674KB

  • MD5

    6345907153d820edf8402066bb70732f

  • SHA1

    12bfb249f916095a68f621afeff496fb930858c0

  • SHA256

    da74061519b19b1653023bec28d65a2153ce7236b8539f417e5831a9a5a908e4

  • SHA512

    cf7080e11fb6723f8f162d343d2c26a32e501f55eb1c5c1122d301197d44fe642adb0678807d4f2dffb528eb7b2cd6df431b96443769eb1dee7849e0d630d982

  • SSDEEP

    12288:8bm1kmrrI8BMuVZFcghkgHmjRzYEJ3jTfneN8MBuuvNtTird:8bvKI8yuvXuYujLnYBRHTEd

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 5 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6345907153d820edf8402066bb70732f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6345907153d820edf8402066bb70732f_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Windows\RunMgr.EXE
      "C:\Windows\RunMgr.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3864 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3680
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c del %SystemRoot%\Debug.exe
      2⤵
        PID:4756
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\634590~1.EXE > nul
        2⤵
          PID:1104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 732
          2⤵
          • Program crash
          PID:516
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3356 -ip 3356
        1⤵
          PID:4532

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          5fe1d5be97aa5a4b444680410010b626

          SHA1

          0b747d5b13d5745fcc81a5819b2db8e11543ab42

          SHA256

          018bb27ecbb368115c6dc85539b5d24b0f7d548a3cc81ace6f7fbdc2a5aa55d4

          SHA512

          b3baa42206a9866e37dbe747a04d82d49e51e8219a8ac51170498cbdb98430a6b3f591151d3dfb133b1734f6fefc62b90efbbb907c800f45e93eae998c009fbe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          1d8c9646e35dd4e2c1747994cfb85e15

          SHA1

          9f7520a5249928a314d6b5117dc8abfd533ea1a0

          SHA256

          10b597ab9880dc51097fc6402c07040f9fd9d857d9bbb82e4876c58f6eeffdc5

          SHA512

          22844be124bd67fd1f1468063083a953aba3188583be1b64da91dddbf55941faa50b30e57cbbf450db370e121398c322926d3ede6742f2adc59ccc0566c24133

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\A4F1OTIC\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Temp\qki67A3.tmp

          Filesize

          172KB

          MD5

          4f407b29d53e9eb54e22d096fce82aa7

          SHA1

          a4ee25b066cac19ff679dd491f5791652bb71185

          SHA256

          cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc

          SHA512

          325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183

        • C:\Windows\RunMgr.EXE

          Filesize

          888KB

          MD5

          897506398278b204b065dc442fcb5bf0

          SHA1

          db3e03cbaa938ac810b0201e3b29da20be86ee5f

          SHA256

          c61c7e0e33ffa0784398acd2813cf09ab328d21d3fdb34ba3efa60a679738296

          SHA512

          d32e2a91ab8954d58153fbe7538c92e5b145624097a12a4f8898ffafa36df2bfa6fcc4b8060881460c17978a511c58c8cb077d89ab1e346984c0f233e814a81e

        • memory/3356-18-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/3356-7-0x0000000000B10000-0x0000000000B11000-memory.dmp

          Filesize

          4KB

        • memory/3356-5-0x0000000000B30000-0x0000000000B31000-memory.dmp

          Filesize

          4KB

        • memory/3356-4-0x00000000005E0000-0x00000000005E1000-memory.dmp

          Filesize

          4KB

        • memory/3356-2-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

          Filesize

          4KB

        • memory/3356-10-0x0000000000B00000-0x0000000000B01000-memory.dmp

          Filesize

          4KB

        • memory/3356-12-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/3356-11-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

          Filesize

          4KB

        • memory/3356-14-0x00000000024B0000-0x00000000024B1000-memory.dmp

          Filesize

          4KB

        • memory/3356-20-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/3356-19-0x00000000024F0000-0x00000000024F1000-memory.dmp

          Filesize

          4KB

        • memory/3356-0-0x0000000000400000-0x0000000000510000-memory.dmp

          Filesize

          1.1MB

        • memory/3356-17-0x00000000024A0000-0x00000000024A1000-memory.dmp

          Filesize

          4KB

        • memory/3356-15-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/3356-16-0x0000000002490000-0x0000000002491000-memory.dmp

          Filesize

          4KB

        • memory/3356-6-0x0000000000B20000-0x0000000000B21000-memory.dmp

          Filesize

          4KB

        • memory/3356-1-0x0000000000B40000-0x0000000000B83000-memory.dmp

          Filesize

          268KB

        • memory/3356-8-0x0000000000600000-0x0000000000601000-memory.dmp

          Filesize

          4KB

        • memory/3356-3-0x00000000005F0000-0x00000000005F1000-memory.dmp

          Filesize

          4KB

        • memory/3356-9-0x0000000000B90000-0x0000000000B91000-memory.dmp

          Filesize

          4KB

        • memory/3356-49-0x0000000000400000-0x0000000000510000-memory.dmp

          Filesize

          1.1MB

        • memory/3356-50-0x0000000000B40000-0x0000000000B83000-memory.dmp

          Filesize

          268KB

        • memory/3356-40-0x00000000032D0000-0x0000000003344000-memory.dmp

          Filesize

          464KB

        • memory/3864-42-0x0000000000390000-0x000000000044A000-memory.dmp

          Filesize

          744KB

        • memory/4496-35-0x0000000002260000-0x00000000022D4000-memory.dmp

          Filesize

          464KB

        • memory/4496-41-0x0000000002860000-0x0000000002861000-memory.dmp

          Filesize

          4KB

        • memory/4496-45-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/4496-46-0x0000000002260000-0x00000000022D4000-memory.dmp

          Filesize

          464KB

        • memory/4496-28-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB