Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 05:18

General

  • Target

    a9bd5add6be1e16bb6e2345c63027767_JaffaCakes118.exe

  • Size

    629KB

  • MD5

    a9bd5add6be1e16bb6e2345c63027767

  • SHA1

    cb381752e3381289fa51c54a52962a0675e6c5ea

  • SHA256

    d70c44503c2b35efc6ae5c05b113f02929711e1eeb0b965d554dc8d5692ccec6

  • SHA512

    edaffe0d63b9b0afcbbc6d86622a0de32998087bbf248537e232feb2b71a4657e1b8a151c79a9f6724923ed813f3a20ba601c315c2710fb4b18678dac974d54a

  • SSDEEP

    12288:tUNe0Jcr6gl5XW0s9QQoZ1jKBE1ptF3Z4mxxgoEtlK+kt9T2MIukPtd+:tvKcrH5E9QQoZYBEztQmX5GN5P6

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9bd5add6be1e16bb6e2345c63027767_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a9bd5add6be1e16bb6e2345c63027767_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 268
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2656
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat""
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\DelSvel.bat

    Filesize

    212B

    MD5

    2f25e1d31bfdfbb80d59da217252076d

    SHA1

    d0063bb23a4cf708652ba287ef8b871c216ade60

    SHA256

    779ca022d8249115fe23fa2b307391a59d24d30fd6be57a000baadfb22e89aec

    SHA512

    60fab0f8fa9ffd3e60ab27def550fa5224b4781e4598969df8b311bfd7a878b2f15f6734fe3b7fa90053075cbdc2c7074d9839d49c53cc2de0b3afefbdb5e32f

  • F:\svchost.exe

    Filesize

    629KB

    MD5

    a9bd5add6be1e16bb6e2345c63027767

    SHA1

    cb381752e3381289fa51c54a52962a0675e6c5ea

    SHA256

    d70c44503c2b35efc6ae5c05b113f02929711e1eeb0b965d554dc8d5692ccec6

    SHA512

    edaffe0d63b9b0afcbbc6d86622a0de32998087bbf248537e232feb2b71a4657e1b8a151c79a9f6724923ed813f3a20ba601c315c2710fb4b18678dac974d54a

  • memory/1152-45-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/1152-60-0x0000000001ED0000-0x0000000001F24000-memory.dmp

    Filesize

    336KB

  • memory/1152-59-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/1152-46-0x0000000001ED0000-0x0000000001F24000-memory.dmp

    Filesize

    336KB

  • memory/2312-18-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2312-2-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/2312-20-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/2312-19-0x00000000033C0000-0x00000000033C1000-memory.dmp

    Filesize

    4KB

  • memory/2312-0-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-17-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2312-15-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-14-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-13-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-12-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-11-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-10-0x0000000001E90000-0x0000000001E91000-memory.dmp

    Filesize

    4KB

  • memory/2312-9-0x0000000002120000-0x0000000002121000-memory.dmp

    Filesize

    4KB

  • memory/2312-8-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/2312-7-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/2312-6-0x0000000001E70000-0x0000000001E71000-memory.dmp

    Filesize

    4KB

  • memory/2312-5-0x0000000001E80000-0x0000000001E81000-memory.dmp

    Filesize

    4KB

  • memory/2312-4-0x0000000002110000-0x0000000002111000-memory.dmp

    Filesize

    4KB

  • memory/2312-3-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

    Filesize

    4KB

  • memory/2312-21-0x00000000033A0000-0x00000000033A1000-memory.dmp

    Filesize

    4KB

  • memory/2312-22-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2312-44-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-42-0x00000000045F0000-0x0000000004705000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-41-0x00000000045F0000-0x0000000004705000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-23-0x0000000003410000-0x0000000003411000-memory.dmp

    Filesize

    4KB

  • memory/2312-47-0x0000000001DD0000-0x0000000001E24000-memory.dmp

    Filesize

    336KB

  • memory/2312-48-0x0000000003480000-0x0000000003481000-memory.dmp

    Filesize

    4KB

  • memory/2312-50-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/2312-57-0x0000000001E60000-0x0000000001E61000-memory.dmp

    Filesize

    4KB

  • memory/2312-58-0x00000000045F0000-0x0000000004705000-memory.dmp

    Filesize

    1.1MB

  • memory/2312-24-0x0000000001E60000-0x0000000001E61000-memory.dmp

    Filesize

    4KB

  • memory/2312-16-0x0000000003380000-0x0000000003383000-memory.dmp

    Filesize

    12KB

  • memory/2312-1-0x0000000001DD0000-0x0000000001E24000-memory.dmp

    Filesize

    336KB

  • memory/2312-75-0x00000000033F0000-0x00000000033F1000-memory.dmp

    Filesize

    4KB

  • memory/2312-74-0x0000000003400000-0x0000000003401000-memory.dmp

    Filesize

    4KB

  • memory/2312-77-0x0000000001DD0000-0x0000000001E24000-memory.dmp

    Filesize

    336KB

  • memory/2312-78-0x0000000000400000-0x0000000000515000-memory.dmp

    Filesize

    1.1MB