Analysis

  • max time kernel
    111s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 13:29

General

  • Target

    cfa440ca8bf01f9f271ac63907b08000_JaffaCakes118.exe

  • Size

    279KB

  • MD5

    cfa440ca8bf01f9f271ac63907b08000

  • SHA1

    e8d3addc70014d9d56182c6421c6386785ffc35a

  • SHA256

    fedd07a94ec37c816f6354ae6d19d7899f5899ca1c1e27adfddaa18b736e281f

  • SHA512

    1608697e79fe7d29aa37cea523944864fc64a95055ef1374b0128d08a7b03fedcbeb875ea9c31bce7ae1233730f0e06ce462251750e3a9c5b94eb0f47ca8e961

  • SSDEEP

    6144:Th0iSvyd1gEs2Iqe5ND/2SIw05mG3J985CW3B0mNXTByHf:aiCEsJqe5JetQG3J95Y0mdNyHf

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfa440ca8bf01f9f271ac63907b08000_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cfa440ca8bf01f9f271ac63907b08000_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\lsassc.exe
      C:\Windows\system32\lsassc.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2532
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Delet.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Delet.bat

    Filesize

    212B

    MD5

    682a71c38f0523fb26a16828cf04dbbe

    SHA1

    df9ae6f26503c1f453778749938222710eba1b5b

    SHA256

    8acaae1df1335b70c4b4b51636319bcff482b91c5a56efc5a984a418b01fd046

    SHA512

    dee135398e3f525e7fca28bbfeeb9baf1ab3be759b62da12c1a2c2c5a9c8f62eebcf6061d38b3394e5669dd082e5701d3dd3d401b68b87425c32380e535124f0

  • \Windows\SysWOW64\lsassc.exe

    Filesize

    279KB

    MD5

    cfa440ca8bf01f9f271ac63907b08000

    SHA1

    e8d3addc70014d9d56182c6421c6386785ffc35a

    SHA256

    fedd07a94ec37c816f6354ae6d19d7899f5899ca1c1e27adfddaa18b736e281f

    SHA512

    1608697e79fe7d29aa37cea523944864fc64a95055ef1374b0128d08a7b03fedcbeb875ea9c31bce7ae1233730f0e06ce462251750e3a9c5b94eb0f47ca8e961

  • memory/1840-0-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1840-1-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1840-21-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB

  • memory/2532-11-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/2532-14-0x0000000000400000-0x000000000050C000-memory.dmp

    Filesize

    1.0MB