Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 23:40

General

  • Target

    d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe

  • Size

    987KB

  • MD5

    d54d81c094ff7ffe62c2c68acf5141a0

  • SHA1

    c901d6093816c390b19e8c6bbf94ac769316eb13

  • SHA256

    13741ac044bd4cf21fbfc2c45cc30725fc2f0d8b613151ba88188b2ff0b8e722

  • SHA512

    dd33c5b4f5df2c654fc4599654549b1c3af4dd8b706e83d64490855a6ad309112436ae157cf9f6f5ac5b1d0eb6bd1f9e1e1095099b62d441e282e0184f7de256

  • SSDEEP

    24576:a0wwuFQZfpcYRz3J/Ae1a8LrEoGPnxp1mkl:XwwiOBFjjJGPngI

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 23 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Hijack Execution Flow: DLL Search Order Hijacking 1 TTPs

    Possible initial access via DLL redirection search order hijacking.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
      2⤵
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Windows\trkk.exe
        "C:\Windows\trkk.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Windows\trkk.exe
          C:\Windows\trkk.exe
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\trkk.exe

    Filesize

    987KB

    MD5

    d54d81c094ff7ffe62c2c68acf5141a0

    SHA1

    c901d6093816c390b19e8c6bbf94ac769316eb13

    SHA256

    13741ac044bd4cf21fbfc2c45cc30725fc2f0d8b613151ba88188b2ff0b8e722

    SHA512

    dd33c5b4f5df2c654fc4599654549b1c3af4dd8b706e83d64490855a6ad309112436ae157cf9f6f5ac5b1d0eb6bd1f9e1e1095099b62d441e282e0184f7de256

  • \??\c:\users\admin\appdata\local\temp\72909358

    Filesize

    14B

    MD5

    043c5cb4c1f58c7e838526b3af99f2a6

    SHA1

    a75adf59cf125e058bb5f23d9ee2a06d2d7886fb

    SHA256

    d96063fa43803b318cf9528bc19f003042560653dbb8f17f34f1300572b8b023

    SHA512

    ace6f668041c04f05ade9e28bc69f2f523124a7352b0fee5ed5121c3ec0a9cb1111abbb622cb4b618b6c6be90a8a8feaf549429b2a4aee99b1294eeca3da0175

  • \Users\Admin\AppData\Roaming\Wplugin.dll

    Filesize

    108KB

    MD5

    8847a8302dacc1d6fca61f125c8fe8e0

    SHA1

    f399142bbf03660bee1df555ebbf3acc8f658cf0

    SHA256

    9c2726defa122089f8251fa104f76d66830f448774ab9bd634adbb6e492e3943

    SHA512

    2b028bb4139c352b80db1509d1a3f479a8ef7e9b3b73ddbf62e2d83d4e59adf4a0bd6b9d68409bc0b6fafb7a5f56844fbfed6d00b824a6b370689801ce1c837f

  • memory/2032-32-0x0000000003C20000-0x0000000003F93000-memory.dmp

    Filesize

    3.4MB

  • memory/2032-1-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/2032-11-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/2032-34-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/2560-26-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-36-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-20-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-18-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-14-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-24-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-31-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-48-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-35-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-22-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-37-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-41-0x0000000003C00000-0x0000000003C10000-memory.dmp

    Filesize

    64KB

  • memory/2560-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2560-30-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-16-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2560-90-0x0000000003C00000-0x0000000003F73000-memory.dmp

    Filesize

    3.4MB

  • memory/2560-49-0x0000000003C00000-0x0000000003F73000-memory.dmp

    Filesize

    3.4MB

  • memory/2780-57-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/2780-54-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/2780-79-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/2884-94-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-93-0x0000000002470000-0x000000000247E000-memory.dmp

    Filesize

    56KB

  • memory/2884-89-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-87-0x0000000002470000-0x000000000247E000-memory.dmp

    Filesize

    56KB

  • memory/2884-82-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-91-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-81-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-83-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-92-0x0000000000290000-0x0000000000298000-memory.dmp

    Filesize

    32KB

  • memory/2884-95-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-98-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-101-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-104-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2884-107-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB