Analysis

  • max time kernel
    95s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 17:09

General

  • Target

    d009d8232c59741477776f97681efc33_JaffaCakes118.exe

  • Size

    671KB

  • MD5

    d009d8232c59741477776f97681efc33

  • SHA1

    cc5171169d546d02c272dff91b2ef5bc3cae48d1

  • SHA256

    854c3f8c8f5ed5494db6764752ea03dd3c9fa217ae710a384f61d39c3473d1f3

  • SHA512

    694248b88c88c6d94db204f43fabd64f8b884d72898d7226add1ec74a90dda8759e2e3cf1c171d0870799c05c4d04f4da1ee6b84f18b9b279974093e3fc52ced

  • SSDEEP

    12288:S0RHBkrnpqb4hCS6hZOuiscgKTbf1ULeQL2yL8A+KDREIIqgH/s6gtHZ:SaIpt/u4fK1ZL8A+eJgiZ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d009d8232c59741477776f97681efc33_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d009d8232c59741477776f97681efc33_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\1.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\1.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\system32\calc.exe"
        3⤵
          PID:2200
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 12
            4⤵
            • Program crash
            PID:1860
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3988
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3988 CREDAT:17410 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:4236
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3120
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2200 -ip 2200
      1⤵
        PID:1016

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat

              Filesize

              212B

              MD5

              002a417fb2b27629d3dba0813406ca56

              SHA1

              b4b05294535b87bbeec86a91ead2377e8c7131f4

              SHA256

              8c0b71b7fce05fc51b57daa53208575000e472cc3c033ddf6cf954ad1eae99e5

              SHA512

              a9dbcbcb000a173b9b9e0fee954c502e8f9115b06f4a9a42d6e3d6a3bda1c8090a7110fab7029690465758d3d23616255a40a0293983fb7b7e56c648900b3504

            • C:\Program Files\Common Files\microsoft shared\MSInfo\1.exe

              Filesize

              671KB

              MD5

              d009d8232c59741477776f97681efc33

              SHA1

              cc5171169d546d02c272dff91b2ef5bc3cae48d1

              SHA256

              854c3f8c8f5ed5494db6764752ea03dd3c9fa217ae710a384f61d39c3473d1f3

              SHA512

              694248b88c88c6d94db204f43fabd64f8b884d72898d7226add1ec74a90dda8759e2e3cf1c171d0870799c05c4d04f4da1ee6b84f18b9b279974093e3fc52ced

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              471B

              MD5

              ba1bf8cf86ec57057637af172911cd13

              SHA1

              32daf654da1afadd3021d486164516318295debf

              SHA256

              77fb6880c4ae2e78d705501c19c9cd4a4d3d2f9e42d45e313561caa0b6c832e0

              SHA512

              46780dd891659bde9eb87f07c857a43de3de9eccc53077b437282d1dd0c1339321399b0faa4cc2a6534396cdd4d358209bfe1f9622bda1e5681acef2b9c4a255

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

              Filesize

              404B

              MD5

              f388b8c1672da69dd1d4383b43fe84b3

              SHA1

              36618c0c15157caac35f0fbe88a1a81018501fb1

              SHA256

              68f89cf6166939581f2d87f3b5709dd419cc4eeb3b24916d5dd3409b470f5d43

              SHA512

              aef6e1b436036c4e2084491484d12677a113bb02bc1963254d62863d0e457180fc82c939bcd153d99b0b08f75def43242216a8c4f6825636483690f4c5fb441e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KQ3665LB\suggestions[1].en-US

              Filesize

              17KB

              MD5

              5a34cb996293fde2cb7a4ac89587393a

              SHA1

              3c96c993500690d1a77873cd62bc639b3a10653f

              SHA256

              c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

              SHA512

              e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

            • memory/2200-53-0x0000000000400000-0x00000000005C7000-memory.dmp

              Filesize

              1.8MB

            • memory/3988-55-0x0000000000030000-0x00000000001F7000-memory.dmp

              Filesize

              1.8MB

            • memory/4012-18-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-39-0x0000000002790000-0x0000000002791000-memory.dmp

              Filesize

              4KB

            • memory/4012-31-0x0000000003570000-0x0000000003573000-memory.dmp

              Filesize

              12KB

            • memory/4012-29-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-28-0x0000000003670000-0x0000000003671000-memory.dmp

              Filesize

              4KB

            • memory/4012-27-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-26-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-36-0x00000000035A0000-0x00000000035A1000-memory.dmp

              Filesize

              4KB

            • memory/4012-35-0x00000000035B0000-0x00000000035B1000-memory.dmp

              Filesize

              4KB

            • memory/4012-34-0x0000000002350000-0x0000000002351000-memory.dmp

              Filesize

              4KB

            • memory/4012-33-0x0000000002340000-0x0000000002341000-memory.dmp

              Filesize

              4KB

            • memory/4012-32-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-25-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-24-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-23-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-22-0x0000000003670000-0x0000000003671000-memory.dmp

              Filesize

              4KB

            • memory/4012-21-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-20-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-19-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-38-0x0000000003600000-0x0000000003601000-memory.dmp

              Filesize

              4KB

            • memory/4012-37-0x0000000003590000-0x0000000003591000-memory.dmp

              Filesize

              4KB

            • memory/4012-3-0x00000000025D0000-0x00000000025D1000-memory.dmp

              Filesize

              4KB

            • memory/4012-17-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-16-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-15-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-30-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-14-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-13-0x0000000003580000-0x0000000003581000-memory.dmp

              Filesize

              4KB

            • memory/4012-12-0x0000000003570000-0x0000000003670000-memory.dmp

              Filesize

              1024KB

            • memory/4012-11-0x00000000025A0000-0x00000000025A1000-memory.dmp

              Filesize

              4KB

            • memory/4012-10-0x0000000002610000-0x0000000002611000-memory.dmp

              Filesize

              4KB

            • memory/4012-9-0x00000000025E0000-0x00000000025E1000-memory.dmp

              Filesize

              4KB

            • memory/4012-7-0x0000000002580000-0x0000000002581000-memory.dmp

              Filesize

              4KB

            • memory/4012-6-0x0000000002590000-0x0000000002591000-memory.dmp

              Filesize

              4KB

            • memory/4012-5-0x0000000002600000-0x0000000002601000-memory.dmp

              Filesize

              4KB

            • memory/4012-4-0x00000000025B0000-0x00000000025B1000-memory.dmp

              Filesize

              4KB

            • memory/4012-42-0x0000000000400000-0x00000000005C7000-memory.dmp

              Filesize

              1.8MB

            • memory/4012-46-0x00000000023E0000-0x0000000002434000-memory.dmp

              Filesize

              336KB

            • memory/4012-47-0x0000000003570000-0x0000000003670000-memory.dmp

              Filesize

              1024KB

            • memory/4012-49-0x0000000003670000-0x0000000003671000-memory.dmp

              Filesize

              4KB

            • memory/4012-48-0x0000000003570000-0x0000000003571000-memory.dmp

              Filesize

              4KB

            • memory/4012-59-0x00000000035E0000-0x00000000035E1000-memory.dmp

              Filesize

              4KB

            • memory/4012-62-0x00000000023E0000-0x0000000002434000-memory.dmp

              Filesize

              336KB

            • memory/4012-0-0x0000000000400000-0x00000000005C7000-memory.dmp

              Filesize

              1.8MB

            • memory/4012-1-0x0000000002340000-0x0000000002341000-memory.dmp

              Filesize

              4KB

            • memory/4012-2-0x00000000023E0000-0x0000000002434000-memory.dmp

              Filesize

              336KB

            • memory/4012-60-0x0000000000400000-0x00000000005C7000-memory.dmp

              Filesize

              1.8MB

            • memory/4012-58-0x00000000035F0000-0x00000000035F1000-memory.dmp

              Filesize

              4KB

            • memory/4012-8-0x00000000025F0000-0x00000000025F1000-memory.dmp

              Filesize

              4KB

            • memory/4500-61-0x0000000000400000-0x00000000005C7000-memory.dmp

              Filesize

              1.8MB

            • memory/4500-63-0x00000000022B0000-0x0000000002304000-memory.dmp

              Filesize

              336KB

            • memory/4500-50-0x00000000022B0000-0x0000000002304000-memory.dmp

              Filesize

              336KB