Analysis

  • max time kernel
    141s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 12:01

General

  • Target

    da4e0703a34085c2fa77d86492273381_JaffaCakes118.exe

  • Size

    2.1MB

  • MD5

    da4e0703a34085c2fa77d86492273381

  • SHA1

    6905a25afa412c21528fa601c121c957d0436248

  • SHA256

    41064f46efbd85824697f4675ff6d70e9b47107891fcc5a966361deb370a70cf

  • SHA512

    98d339c8e915f8d967641eafc22ee14216a9d5dd61e660d0aba557af622667b52eeacb9d54a043b04bae6079937986d4b7ad219077ceea348de328b6520d6327

  • SSDEEP

    24576:IbYUSrlwjSVB9y81hXlEM2Iu9VYRj/1rRiVzC2:Is3zy4u9WD1twzC

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da4e0703a34085c2fa77d86492273381_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da4e0703a34085c2fa77d86492273381_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\~RomDmp1\RomDump.com > C:\Users\Admin\AppData\Local\Temp\~RomDmp1\Rom.dmp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wake.ini

    Filesize

    30B

    MD5

    ebfe4b94ac788c0f0d61c7f2cbc8e1b6

    SHA1

    5d0e3e95f1a8d750928378f97a844e64a9c96d4e

    SHA256

    90a6387cb6130b3b01768766981740c3cde56181234c526185fe6c079430e164

    SHA512

    1f6ba345063a12e4ba04a1327ecad089b5636eda3cf74f6858ca2e7a657ea827ec0c3d6648800b55e49c6bb87346cdf1fe364322fbe238667755b34fdf1e14ed

  • C:\Users\Admin\AppData\Local\Temp\wake.ini

    Filesize

    16B

    MD5

    01cd931d712a7d4b7943ca0ae8e6d774

    SHA1

    0f5e5ab9c138f0616fb9e3f09e6561d5ec9bae20

    SHA256

    83047afb974e165e3fa9f0f2173f0f94dee2497b96dc363ad34a4226bc2f54fa

    SHA512

    2342aed3603c9600be887791ab6516267110f74f8dab53ee0c8a453b7b5c7c8379d05c837aafcf0a7e3ed75275f4550c3b89d8cf357396ba063ca7b5970b0296

  • memory/2216-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2216-16-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2216-15-0x0000000000400000-0x0000000000615000-memory.dmp

    Filesize

    2.1MB

  • memory/2216-24-0x0000000000400000-0x0000000000615000-memory.dmp

    Filesize

    2.1MB