Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 07:13

General

  • Target

    d9d9b87ab9e2d1b23c4fe43ac8989e0a_JaffaCakes118.exe

  • Size

    373KB

  • MD5

    d9d9b87ab9e2d1b23c4fe43ac8989e0a

  • SHA1

    4a5c8238f0926a435ee8236b78095f85b53aba86

  • SHA256

    cb8abdd1fc0fefb3d1d8cff69289a4c891a7b5741793a77f07804dc77b9d712d

  • SHA512

    40f27726b46f30c2c86e4d120de3bd30c7785184a55945b0a70d1870463a8356b8c68f5e8cc68657af25aa878342f29eafe0f64ffcdb8fb1822b660aea5f39a3

  • SSDEEP

    6144:QZwnDGQWGHXBQX+poeHbFSJH9gMUa2CdrgB0XMiFv5LgM0l2Xa4pJeL1NDoSAg0O:QZuG6h2Eb8PU8rgB08iRlXxENDoS0O

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9d9b87ab9e2d1b23c4fe43ac8989e0a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9d9b87ab9e2d1b23c4fe43ac8989e0a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\bxhty1.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\bxhty1.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2080
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\d9d9b87ab9e2d1b23c4fe43ac8989e0a_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\bxhty1.exe

    Filesize

    373KB

    MD5

    d9d9b87ab9e2d1b23c4fe43ac8989e0a

    SHA1

    4a5c8238f0926a435ee8236b78095f85b53aba86

    SHA256

    cb8abdd1fc0fefb3d1d8cff69289a4c891a7b5741793a77f07804dc77b9d712d

    SHA512

    40f27726b46f30c2c86e4d120de3bd30c7785184a55945b0a70d1870463a8356b8c68f5e8cc68657af25aa878342f29eafe0f64ffcdb8fb1822b660aea5f39a3

  • memory/2080-22-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2080-27-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2080-30-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2280-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2280-1-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2280-20-0x0000000002F90000-0x000000000304F000-memory.dmp

    Filesize

    764KB

  • memory/2280-31-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB