Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 23:40

General

  • Target

    d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe

  • Size

    987KB

  • MD5

    d54d81c094ff7ffe62c2c68acf5141a0

  • SHA1

    c901d6093816c390b19e8c6bbf94ac769316eb13

  • SHA256

    13741ac044bd4cf21fbfc2c45cc30725fc2f0d8b613151ba88188b2ff0b8e722

  • SHA512

    dd33c5b4f5df2c654fc4599654549b1c3af4dd8b706e83d64490855a6ad309112436ae157cf9f6f5ac5b1d0eb6bd1f9e1e1095099b62d441e282e0184f7de256

  • SSDEEP

    24576:a0wwuFQZfpcYRz3J/Ae1a8LrEoGPnxp1mkl:XwwiOBFjjJGPngI

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 24 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 11 IoCs
  • Hijack Execution Flow: DLL Search Order Hijacking 1 TTPs

    Possible initial access via DLL redirection search order hijacking.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\trkk.exe
        "C:\Windows\trkk.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Windows\trkk.exe
          C:\Windows\trkk.exe
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Wplugin.dll

    Filesize

    108KB

    MD5

    8847a8302dacc1d6fca61f125c8fe8e0

    SHA1

    f399142bbf03660bee1df555ebbf3acc8f658cf0

    SHA256

    9c2726defa122089f8251fa104f76d66830f448774ab9bd634adbb6e492e3943

    SHA512

    2b028bb4139c352b80db1509d1a3f479a8ef7e9b3b73ddbf62e2d83d4e59adf4a0bd6b9d68409bc0b6fafb7a5f56844fbfed6d00b824a6b370689801ce1c837f

  • C:\Windows\cmsetac.dll

    Filesize

    32KB

    MD5

    2ad4cedf22060fbb72e5d438aaaa98ad

    SHA1

    839bd8f824577488051574ca0d585079e125d47c

    SHA256

    eb87d744e39a8ea2a730bbcc113f3b3e1e7cb06717c6672d49275f45fac763e6

    SHA512

    ec8ac25e39cc9c5b346d31ee0a288644aff5ea84019208ad931f6dbe6799a987448f7e5c68ec731495025be79fcce9533c5a7a94ba75bd48a17359df9eed229c

  • C:\Windows\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • C:\Windows\trkk.exe

    Filesize

    987KB

    MD5

    d54d81c094ff7ffe62c2c68acf5141a0

    SHA1

    c901d6093816c390b19e8c6bbf94ac769316eb13

    SHA256

    13741ac044bd4cf21fbfc2c45cc30725fc2f0d8b613151ba88188b2ff0b8e722

    SHA512

    dd33c5b4f5df2c654fc4599654549b1c3af4dd8b706e83d64490855a6ad309112436ae157cf9f6f5ac5b1d0eb6bd1f9e1e1095099b62d441e282e0184f7de256

  • \??\c:\users\admin\appdata\local\temp\72909358

    Filesize

    14B

    MD5

    043c5cb4c1f58c7e838526b3af99f2a6

    SHA1

    a75adf59cf125e058bb5f23d9ee2a06d2d7886fb

    SHA256

    d96063fa43803b318cf9528bc19f003042560653dbb8f17f34f1300572b8b023

    SHA512

    ace6f668041c04f05ade9e28bc69f2f523124a7352b0fee5ed5121c3ec0a9cb1111abbb622cb4b618b6c6be90a8a8feaf549429b2a4aee99b1294eeca3da0175

  • memory/768-39-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/768-42-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/768-58-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/1152-20-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/1152-0-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/1152-13-0x0000000000400000-0x0000000000773000-memory.dmp

    Filesize

    3.4MB

  • memory/1480-18-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1480-21-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1480-17-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1480-34-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1480-16-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-62-0x00000000022D0000-0x00000000022DE000-memory.dmp

    Filesize

    56KB

  • memory/1640-75-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-50-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-49-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-64-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-65-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-66-0x0000000000620000-0x0000000000628000-memory.dmp

    Filesize

    32KB

  • memory/1640-67-0x00000000022D0000-0x00000000022DE000-memory.dmp

    Filesize

    56KB

  • memory/1640-68-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-69-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-72-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-48-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-78-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-81-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-84-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-87-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-90-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-93-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-96-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-99-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-102-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1640-105-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB