Analysis

  • max time kernel
    13s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 12:40

General

  • Target

    d1f4c065b3b0201e305cbbed6b66c9dd_JaffaCakes118.exe

  • Size

    651KB

  • MD5

    d1f4c065b3b0201e305cbbed6b66c9dd

  • SHA1

    67db52797e7d85d10429d3accb8b14fb44a8a2ed

  • SHA256

    43846b93aa53c94fb60d6373d0b1764d220514abe9d1e44f26dcc835db14fcef

  • SHA512

    2c3330512a1f45721f18e61637372a32129812e3d41d28fb28803d3c64916bb370227a58338fd2d751930e854a54564aec494c0bee1c3d5631791c172464de8a

  • SSDEEP

    12288:kpyZT1VrCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx1VjOD3SxcDDcNDqWYurL0

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • ModiLoader Second Stage 11 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1f4c065b3b0201e305cbbed6b66c9dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d1f4c065b3b0201e305cbbed6b66c9dd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\d1f4c065b3b0201e305cbbed6b66c9dd_JaffaCakes118.exe
      d1f4c065b3b0201e305cbbed6b66c9dd_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Users\Admin\dHY4IvP3.exe
        C:\Users\Admin\dHY4IvP3.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Users\Admin\weuja.exe
          "C:\Users\Admin\weuja.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2520
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del dHY4IvP3.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2128
      • C:\Users\Admin\azhost.exe
        C:\Users\Admin\azhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Users\Admin\azhost.exe
          azhost.exe
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2876
      • C:\Users\Admin\bzhost.exe
        C:\Users\Admin\bzhost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1124
        • C:\Users\Admin\bzhost.exe
          bzhost.exe
          4⤵
            PID:1948
        • C:\Users\Admin\czhost.exe
          C:\Users\Admin\czhost.exe
          3⤵
            PID:2516
            • C:\Users\Admin\czhost.exe
              czhost.exe
              4⤵
                PID:2060
            • C:\Users\Admin\dzhost.exe
              C:\Users\Admin\dzhost.exe
              3⤵
                PID:1744
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe"
                  4⤵
                    PID:2024
                • C:\Users\Admin\ezhost.exe
                  C:\Users\Admin\ezhost.exe
                  3⤵
                    PID:2040
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c tasklist&&del d1f4c065b3b0201e305cbbed6b66c9dd_JaffaCakes118.exe
                    3⤵
                      PID:1084
                      • C:\Windows\SysWOW64\tasklist.exe
                        tasklist
                        4⤵
                        • Enumerates processes with tasklist
                        PID:3012

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\azhost.exe

                  Filesize

                  248KB

                  MD5

                  27ef898ce7ec9c0b79a6996a0b419de1

                  SHA1

                  4e8aed756fbc6133af13028c33366d2eaa43f954

                  SHA256

                  f08df8dd8e3fe3de4a1ba4ba3bd355a233cf7febd5917b982ec5a949726c36a6

                  SHA512

                  5c7fa67e7ed1e8ce238e58f0b55618d1fc13af4e19d9267f6e88e277beb2f10e6c0f0027a532a2d1d4b6e40da1b31dfcacf50ccb71a75dc231ff876869b6787a

                • C:\Users\Admin\bzhost.exe

                  Filesize

                  138KB

                  MD5

                  4e22775699416e81275fea3266e14bba

                  SHA1

                  32cc2479a30abd1b40b3b7e959ac32317fa124fd

                  SHA256

                  95dc812e94d5ba0842af45685ca7262b55607336fcf4becda83dbb6416beffa9

                  SHA512

                  34b13e9142a9c4251c78d876f02f9e86f22253950d3f9126dacd8ec6f0f3bbd36146381ce16b130d794c4bbc1ba08aa4df8e2e7af0c3900035d486242c81e3bf

                • C:\Users\Admin\dHY4IvP3.exe

                  Filesize

                  288KB

                  MD5

                  e2a16fca33158332dbb3c66021fe8e3b

                  SHA1

                  9b784a05bf73e0bffbc2d6afe9acb4ca9d44a355

                  SHA256

                  17b36341825621fdf4a959b52c510dbf1295e89d380499b2d02a87d76ed68a82

                  SHA512

                  6ec42b9cbd79a0835abdb2e7e4484d143bea726d9d17929482d1efb16590d895bcbe24e7957dcfc26f093f7a6d1dc07644c649d5918227f101a2515dddb86550

                • C:\Users\Admin\ezhost.exe

                  Filesize

                  28KB

                  MD5

                  46ede15ce82c221c24bf81b2de1be7e8

                  SHA1

                  c332a5ec7aeb213c13449626156f6623351a4393

                  SHA256

                  a360c27de3799bf85f2501d4b375744394643fd50f8ecf5241d170b5cb7f6782

                  SHA512

                  517f497a4783a0f67ccfca641d93b7f20505c89d6252229f5b97df674f7be20ae48d4732c137ba081c2c1f8ec712371fa4ba4602873e11c0e02b109a00b6c316

                • C:\Users\Admin\weuja.exe

                  Filesize

                  288KB

                  MD5

                  6d3bc08e77edf92f422110af7f417890

                  SHA1

                  ad465b7686c0a67e353f22a92780fd4b7fc364d7

                  SHA256

                  6b5768c0ab60d6546ef08b1cdfe58b65a9b5d300258b70eaa57ac896a651fe09

                  SHA512

                  f3933dd430365dab9d79505f1fe4414b1bd3800cabdc5ec023588a3e6ded08d1d7d7416ed93a031f21a381fb0ec88788cb3874568277430e86fcf4bc315f991d

                • \??\globalroot\systemroot\assembly\temp\@

                  Filesize

                  2KB

                  MD5

                  3b20e1f8ae7e411590d61b21fc440b23

                  SHA1

                  0e386b114451ed7c2b660cd55469014d9f904577

                  SHA256

                  84f0e4cc9fa607f7ddd72af5a8b2ea697f6ffbb49f11c7da7ce2c70c3b11690c

                  SHA512

                  0a3a239306589951d837952566645e33d29f7a62bf19905f569647baef597fa2865c0fd35b8db7dae783a9f8bb6cc029f60e75703606fdf1a125fdbe15980169

                • \Users\Admin\czhost.exe

                  Filesize

                  96KB

                  MD5

                  fb7e8882346223dfbad778b5a7f74f32

                  SHA1

                  8285032fbab2f9f52533657d46df457ab64d0e15

                  SHA256

                  6d6fa60b26cd2fc87c94afb20e7f3b35d6eca76d5a46191b8df802d30d4cbc3e

                  SHA512

                  31e3963dd156da4a57b3ffd37b857ee1d433c61dc22eb56356f2171b282f3735a1c31d65b3a0b431151b55bfebf964f82c5aa13a12f1c2a8a580840a7ea5da32

                • \Users\Admin\dzhost.exe

                  Filesize

                  221KB

                  MD5

                  5b414fb77d0dbec97ee529ec0bbcbeaf

                  SHA1

                  359cd24cd341f75eb46b99375824f6b649443f8e

                  SHA256

                  62027b13d4918e5e644952c977960a5e6dfe241e2bb35b387de0bfd0b752e882

                  SHA512

                  887b1b93e51d21927ffba49536f281003eef1dbee7634a08cab256f07701d54fe755acab7ae4a513c754067e4144c44c3580689ce187fd584ba440ab748a2360

                • \Windows\System32\consrv.dll

                  Filesize

                  53KB

                  MD5

                  63e99b675a1337db6d8430195ea3efd2

                  SHA1

                  1baead2bf8f433dc82f9b2c03fd65ce697a92155

                  SHA256

                  6616179477849205eb4075b75a042056d196f45d67f78929dbb3317a35ccbea9

                  SHA512

                  f5b986eafa38dbc9ad7759784ac887ecbb9c8d8009a3f33e91b9c9ceeaf043ed3e4ddab8e6b6b77e54aed9fcecab02442c8ff253f2136ea06996d05ddd68199f

                • memory/376-10-0x0000000000400000-0x000000000041C000-memory.dmp

                  Filesize

                  112KB

                • memory/1124-92-0x0000000000400000-0x000000000041B000-memory.dmp

                  Filesize

                  108KB

                • memory/1744-154-0x0000000000400000-0x0000000000464000-memory.dmp

                  Filesize

                  400KB

                • memory/1744-130-0x0000000000470000-0x00000000004B5000-memory.dmp

                  Filesize

                  276KB

                • memory/1940-15-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-3-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-13-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-12-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-4-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-189-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-123-0x0000000001C90000-0x0000000001CF4000-memory.dmp

                  Filesize

                  400KB

                • memory/1940-6-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-78-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-0-0x0000000000400000-0x0000000000507000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1940-128-0x0000000001C90000-0x0000000001CF4000-memory.dmp

                  Filesize

                  400KB

                • memory/1940-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                  Filesize

                  4KB

                • memory/1948-96-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1948-85-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1948-84-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1948-82-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1948-89-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1948-95-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1948-156-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/2060-107-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/2060-119-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/2060-113-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/2060-109-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/2060-118-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/2060-105-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/2060-120-0x0000000000400000-0x000000000040E000-memory.dmp

                  Filesize

                  56KB

                • memory/2516-116-0x0000000000400000-0x000000000041B000-memory.dmp

                  Filesize

                  108KB

                • memory/2640-68-0x0000000000400000-0x000000000041B000-memory.dmp

                  Filesize

                  108KB

                • memory/2876-52-0x0000000000400000-0x0000000000437000-memory.dmp

                  Filesize

                  220KB

                • memory/2876-54-0x0000000000400000-0x0000000000437000-memory.dmp

                  Filesize

                  220KB

                • memory/2876-56-0x0000000000400000-0x0000000000437000-memory.dmp

                  Filesize

                  220KB

                • memory/2876-60-0x0000000000400000-0x0000000000437000-memory.dmp

                  Filesize

                  220KB

                • memory/2876-62-0x0000000000400000-0x0000000000437000-memory.dmp

                  Filesize

                  220KB

                • memory/2876-66-0x0000000000400000-0x0000000000437000-memory.dmp

                  Filesize

                  220KB

                • memory/2876-70-0x0000000000400000-0x0000000000437000-memory.dmp

                  Filesize

                  220KB