Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2024, 15:23

General

  • Target

    cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe

  • Size

    575KB

  • MD5

    cd0f474d0d7b5ded430f896b825f2369

  • SHA1

    49a09d620bf8681b7f9eb3ed8300f48cc357b1a9

  • SHA256

    4c63ef32f54ad2c1721f0b339823060fc5b45e739c6ab835ed7e6923ad423cea

  • SHA512

    471f5e4f355a0053b9e10323256b9a08176df27bc22bd7da01d8dd34822b404f4cac3c0b960df83a97fca3e51a1d8320ef8525f6239ab6b11faaa752729ce953

  • SSDEEP

    12288:UMOjpD8p8jN+5M2wkze0cb9xvo28GoIE1c2obY7zWBULDQ/gq4:UMOjR0w85Kf0WBo2tmocEE

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cd0f474d0d7b5ded430f896b825f2369_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\system32\calc.exe"
        3⤵
          PID:4872
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 12
            4⤵
            • Program crash
            PID:4864
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          3⤵
            PID:2760
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 692
            3⤵
            • Program crash
            PID:2344
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""
          2⤵
          • System Location Discovery: System Language Discovery
          PID:4688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1360 -ip 1360
        1⤵
          PID:3820
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4872 -ip 4872
          1⤵
            PID:1160

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat

            Filesize

            212B

            MD5

            3da436a0858257df283a9a8b3c12eaaa

            SHA1

            2ef9bf7dcde19da5b2230aae858985294dede9d0

            SHA256

            9126fc45676fabc4ff8f4cf8083b4aedebf77678eb8fc05a220d68bf1330acca

            SHA512

            b29624425139837943c437067d51a6de74895a2c782ea015ebfe1a1e350f5eeea1dfeeca3718e0127923d593b6076ce9c2ef69044a9659ccd623081b790c3257

          • C:\Program Files\Common Files\microsoft shared\MSInfo\rejoice46.exe

            Filesize

            575KB

            MD5

            cd0f474d0d7b5ded430f896b825f2369

            SHA1

            49a09d620bf8681b7f9eb3ed8300f48cc357b1a9

            SHA256

            4c63ef32f54ad2c1721f0b339823060fc5b45e739c6ab835ed7e6923ad423cea

            SHA512

            471f5e4f355a0053b9e10323256b9a08176df27bc22bd7da01d8dd34822b404f4cac3c0b960df83a97fca3e51a1d8320ef8525f6239ab6b11faaa752729ce953

          • memory/864-4-0x00000000024A0000-0x00000000024A1000-memory.dmp

            Filesize

            4KB

          • memory/864-14-0x0000000002270000-0x0000000002271000-memory.dmp

            Filesize

            4KB

          • memory/864-11-0x0000000002D50000-0x0000000002D51000-memory.dmp

            Filesize

            4KB

          • memory/864-10-0x0000000002D40000-0x0000000002E40000-memory.dmp

            Filesize

            1024KB

          • memory/864-2-0x0000000002520000-0x0000000002521000-memory.dmp

            Filesize

            4KB

          • memory/864-7-0x0000000002530000-0x0000000002531000-memory.dmp

            Filesize

            4KB

          • memory/864-6-0x00000000024F0000-0x00000000024F1000-memory.dmp

            Filesize

            4KB

          • memory/864-5-0x00000000024E0000-0x00000000024E1000-memory.dmp

            Filesize

            4KB

          • memory/864-0-0x0000000000400000-0x0000000000508000-memory.dmp

            Filesize

            1.0MB

          • memory/864-12-0x0000000002D40000-0x0000000002D43000-memory.dmp

            Filesize

            12KB

          • memory/864-15-0x0000000002280000-0x0000000002281000-memory.dmp

            Filesize

            4KB

          • memory/864-9-0x00000000024C0000-0x00000000024C1000-memory.dmp

            Filesize

            4KB

          • memory/864-13-0x0000000002D90000-0x0000000002D91000-memory.dmp

            Filesize

            4KB

          • memory/864-18-0x0000000002D60000-0x0000000002D61000-memory.dmp

            Filesize

            4KB

          • memory/864-3-0x00000000024B0000-0x00000000024B1000-memory.dmp

            Filesize

            4KB

          • memory/864-8-0x0000000002500000-0x0000000002501000-memory.dmp

            Filesize

            4KB

          • memory/864-1-0x00000000022C0000-0x0000000002310000-memory.dmp

            Filesize

            320KB

          • memory/864-28-0x0000000000400000-0x0000000000508000-memory.dmp

            Filesize

            1.0MB

          • memory/864-29-0x00000000022C0000-0x0000000002310000-memory.dmp

            Filesize

            320KB

          • memory/1360-31-0x0000000000400000-0x0000000000508000-memory.dmp

            Filesize

            1.0MB

          • memory/4872-24-0x0000000000400000-0x0000000000508000-memory.dmp

            Filesize

            1.0MB