Analysis

  • max time kernel
    134s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2024, 20:49

General

  • Target

    cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe

  • Size

    73KB

  • MD5

    cd937b96f400ae28d59a2d5f8d684ba8

  • SHA1

    ed3eb80169ecad815508e1c55f3e20a6a6ef3747

  • SHA256

    ecf9de801ecd7f873af3a890600aead419d5b88612751dfc89a479d23a3d7a5e

  • SHA512

    e327c7d9169a76f0267ca73a3532eefb5f19b7f449b9a5c77c0320fa8aa4575e97ee036b0b5a949b05954fe989925a6eb91def6cde14bc4a3e45f064f933381a

  • SSDEEP

    1536:f8oGku5lOA9RouT39LiUDLK/OOh4o1XmUS+C:f8oGCA9RouT39LiuW/OOhfYv+C

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cd937b96f400ae28d59a2d5f8d684ba8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5636
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 480
        3⤵
        • Program crash
        PID:1676
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1756 -ip 1756
    1⤵
      PID:5948
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4300,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1424 /prefetch:8
      1⤵
        PID:5308

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        54KB

        MD5

        78fd075bab9f67776a45c36fbace64bd

        SHA1

        4bb3cdee77299bcea1fa3633ecad74a1c3b1dd35

        SHA256

        72adc4c24164156a2bca0827dcebf0e8fe3da8be3481a877acf5cc03a2d35971

        SHA512

        5913568e3c616220d195dfa60ae4df21dfe633cd2bbf9c3bdf37bba8cd87f2f70b1d54ae32316e78c7378119b54039a18d68a449fc64c71ac241c5ca98d142d5

      • memory/1756-9-0x0000000000400000-0x0000000000415000-memory.dmp

        Filesize

        84KB

      • memory/5636-8-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB