Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 06:00

General

  • Target

    d9becae8e9f87d05b890fddc56d1df6c_JaffaCakes118.exe

  • Size

    369KB

  • MD5

    d9becae8e9f87d05b890fddc56d1df6c

  • SHA1

    2816e9e91004e5106fbaea997094882c1ef86792

  • SHA256

    f48455c3a87ecb3c39b4e0813a386e5abd1c063b1db39a5590ad07817d6be911

  • SHA512

    59c71303684a751622118b691eeb660363595a080ebde53c4c14ec82405aa8b26545f9ed72487701568ab250100fe602b79ee2d823de2163aab9e59ee77ad936

  • SSDEEP

    6144:9a08DfOXVn1Lwv7IU/zcPDK79CPrfWaTHzdBKDs888mhBF5pey2f18KXf:X8DfC4cPDM9aNBKDs883hBQy8XP

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9becae8e9f87d05b890fddc56d1df6c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9becae8e9f87d05b890fddc56d1df6c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\Server47.exe
      C:\Windows\system32\Server47.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3000
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\SetupDel.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\SetupDel.bat

    Filesize

    212B

    MD5

    c3351603f1d417966f300dab8ab43c69

    SHA1

    b0ff421a4b14e39aa0f4aa447cdc29c3c4e142df

    SHA256

    50c42aca92d3507126fb17ec4565356cc6a847fb0f23d971b13fd58d73e54e38

    SHA512

    7f8459bac86eb8089144b94fbf81a25ba1410865da3324c54096f0eec41fb820bd218f79357a70d5af93d1a2296e95f702c8b5efd471f73ee006aa49f3bc354f

  • \Windows\SysWOW64\Server47.exe

    Filesize

    369KB

    MD5

    d9becae8e9f87d05b890fddc56d1df6c

    SHA1

    2816e9e91004e5106fbaea997094882c1ef86792

    SHA256

    f48455c3a87ecb3c39b4e0813a386e5abd1c063b1db39a5590ad07817d6be911

    SHA512

    59c71303684a751622118b691eeb660363595a080ebde53c4c14ec82405aa8b26545f9ed72487701568ab250100fe602b79ee2d823de2163aab9e59ee77ad936

  • memory/2316-0-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/2316-1-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2316-2-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2316-11-0x0000000002F10000-0x0000000003029000-memory.dmp

    Filesize

    1.1MB

  • memory/2316-24-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB

  • memory/3000-13-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3000-15-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3000-23-0x0000000000400000-0x0000000000519000-memory.dmp

    Filesize

    1.1MB