Analysis

  • max time kernel
    11s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 10:52

General

  • Target

    d4304e9ce14a5e7340f50b0abb5e38cc_JaffaCakes118.exe

  • Size

    442KB

  • MD5

    d4304e9ce14a5e7340f50b0abb5e38cc

  • SHA1

    418aac84d133926bf5c6d4fc314d7591d59a035c

  • SHA256

    6875b7ec7a81efb2b40fbb8ee518c433e5d11b672fdaadf8a141f6e8e920b3c6

  • SHA512

    578fc4686629e738dee999ebde92e0e5fdfad9c07ba6a17b35d562ff042dd919c59f71f19ad9857901a93abdd0ee05e02dedc6b108acb882166a1b23424faaf3

  • SSDEEP

    12288:KSjkj0CnqfVe9zfV52+RU/SNL7Wv6YMnYB:KMk/nqs9zfVlR8SNL7WvWY

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4304e9ce14a5e7340f50b0abb5e38cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d4304e9ce14a5e7340f50b0abb5e38cc_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ¸´~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ¸´~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
          PID:2844

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ¸´~1.EXE

      Filesize

      692KB

      MD5

      0c9a117b088fc9b7a117a15b2b78b061

      SHA1

      f1dc5d6d198a931134488c28fdd5947bb4f43ab2

      SHA256

      22cde3c8f91f7b647cbfd24475bc155a9c699ef47cf4a6c17cc878a6c2225efa

      SHA512

      6ad505f68d11f8cb6842c07f226f1b90099ed094e2f4a6cc10475421d7e49cfa6424549d736b19c18e28f56e8c1b895f7944501916e58a79895d1f895fee80df

    • memory/1424-10-0x0000000000240000-0x0000000000300000-memory.dmp

      Filesize

      768KB

    • memory/1424-9-0x0000000000240000-0x0000000000300000-memory.dmp

      Filesize

      768KB

    • memory/2308-11-0x0000000000400000-0x00000000004BF01C-memory.dmp

      Filesize

      764KB

    • memory/2308-17-0x0000000000400000-0x00000000004BF01C-memory.dmp

      Filesize

      764KB

    • memory/2308-18-0x00000000002B0000-0x00000000002B3000-memory.dmp

      Filesize

      12KB