Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 17:53

General

  • Target

    d283b6281b34c194537a8bb44a2f037c_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    d283b6281b34c194537a8bb44a2f037c

  • SHA1

    32270f548f1a603b5ce3114783fa6ba3274d26af

  • SHA256

    7027dad60a6c5cd5e8f78ce709a209cf30efec2f3dce919caf200d9135cc2111

  • SHA512

    97d6b6bf4f9f2445aefc1cc2bb0f063dd6135648780d5af458023c6fb65531cf90300c8d29fcf89a8c2aedfce75ca0a01c5e4a0ad2a045a37bf6ab722db10fab

  • SSDEEP

    1536:dsCqYOQXNCefAoKv6qZQQAe55461JyJpFHSOuopAvbVrgY:/OmN8oKfQven4Ycp1Sa2BgY

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d283b6281b34c194537a8bb44a2f037c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d283b6281b34c194537a8bb44a2f037c_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Windows\wmsj.exe
      C:\Windows\wmsj.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\video.dll

    Filesize

    35KB

    MD5

    745eabb62a23814b311ecfb40fc714bf

    SHA1

    bbcbd3dfec3c3a575b63278aa7273259a604cf4f

    SHA256

    84d2ca06fa81b634822d2e2465fe1cf036690730885f1a97cc203b93e55ddaea

    SHA512

    f62700b5f2932be3affae9cce532590a5152959aab98aa27313ed124ec744ad31ed0c5f1a860d85b474628764cf011aea8cc29f55c25d67ec8b8887b5f6c46ca

  • C:\Windows\wmsj.exe

    Filesize

    152KB

    MD5

    d283b6281b34c194537a8bb44a2f037c

    SHA1

    32270f548f1a603b5ce3114783fa6ba3274d26af

    SHA256

    7027dad60a6c5cd5e8f78ce709a209cf30efec2f3dce919caf200d9135cc2111

    SHA512

    97d6b6bf4f9f2445aefc1cc2bb0f063dd6135648780d5af458023c6fb65531cf90300c8d29fcf89a8c2aedfce75ca0a01c5e4a0ad2a045a37bf6ab722db10fab

  • memory/876-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/876-14-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/3384-11-0x0000000000590000-0x000000000059E000-memory.dmp

    Filesize

    56KB

  • memory/3384-16-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/3384-15-0x0000000000590000-0x000000000059E000-memory.dmp

    Filesize

    56KB