Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/09/2024, 10:59

General

  • Target

    d821c635556c27552f45474ff6e58853_JaffaCakes118.exe

  • Size

    270KB

  • MD5

    d821c635556c27552f45474ff6e58853

  • SHA1

    816208d9a32df884e3dfc57dc0c6710f397dc0d1

  • SHA256

    1c2d13c3eef6f86e876e558c32010fbdbeb65ec99bcb6a05f75a4446dcc72e23

  • SHA512

    06eb9a6e05c4cdeeb4e447a4496cd1cadcd4a06194ae4150a9b9257909cd4974f06990b79693ca87c52fe2aa9b32acf492a1f4ffcb0304f7d080d4d1f0ff241e

  • SSDEEP

    6144:KG377xS2Vp2CeiorXhwTBOz53/pcCJJvH:Zr7xS2Vp6FwT8bJJvH

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 14 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d821c635556c27552f45474ff6e58853_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d821c635556c27552f45474ff6e58853_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cmsetac.dll

    Filesize

    33KB

    MD5

    edb1a3ff9a25b34c71c7845bad37902b

    SHA1

    e9ad70c3ca0d541c1183325bf1ac71a45d8a8d31

    SHA256

    c7618a55e1260716b946d1510da3e49ee696b96ed044051496342f6f1cea8761

    SHA512

    e8d60cd0ded8e325e416ad33cbfc9fe31a26af22bc6ee7e0db3cb221df17e37a0d567b3884253072dbbd752da91d6cf0989c8be66de428ea114cb3767eca693d

  • C:\Users\Admin\AppData\Local\Temp\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/2688-25-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-28-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-15-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/2688-16-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-17-0x0000000000B40000-0x0000000000B48000-memory.dmp

    Filesize

    32KB

  • memory/2688-18-0x00000000047F0000-0x00000000047FE000-memory.dmp

    Filesize

    56KB

  • memory/2688-19-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-22-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-0-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/2688-12-0x00000000047F0000-0x00000000047FE000-memory.dmp

    Filesize

    56KB

  • memory/2688-31-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-34-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-37-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-40-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-43-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-46-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-49-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-52-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2688-55-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB