Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 09:23

General

  • Target

    de23d569b50a2b684a163818a2daf71f_JaffaCakes118.exe

  • Size

    735KB

  • MD5

    de23d569b50a2b684a163818a2daf71f

  • SHA1

    d269320b087a99fbbd2bbba297c121b12b8d47a2

  • SHA256

    938fa8cd23f3fc51be3106eb8991a2bed9c4dac188f4eaa708585ad83f4356f9

  • SHA512

    81c3e2541603ac359e622bed6eb0c9496bf94b249b64a6c60d1ec5f081982968e2c7743c0d0f92d3c05282379c00ae378c3c5d2cb4aa7a8827ce902211a435e7

  • SSDEEP

    12288:R4r67oM8MXxupIDwI7xXaR0QA55260qeEvtsoc4wLvJCOCpJfzrxjHlshmKA:am7oM8MXIpI5kR42YeEvtsoc4wLvJC7H

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de23d569b50a2b684a163818a2daf71f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de23d569b50a2b684a163818a2daf71f_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Program Files\kablife1.exe
      "C:\Program Files\kablife1.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Windows\SysWOW64\mspaint.exe
        "C:\Windows\system32\mspaint.exe"
        3⤵
        • Suspicious use of UnmapMainImage
        PID:3420
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 12
          4⤵
          • Program crash
          PID:2620
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
          PID:5004
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files\SgotoDel.bat""
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3420 -ip 3420
      1⤵
        PID:1392

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\SgotoDel.bat

        Filesize

        212B

        MD5

        0cdaadf6140c29baea3618be7853f9bb

        SHA1

        6529b99113c82383bea397b02bde44e403175ff9

        SHA256

        9f93a7cc115fc2f94b25fe331d96b8870ae1104cdf7b24a3b15050c816576f53

        SHA512

        d11ead2deab5a8427ab574ab59d938d920802ddbea3275ee5a42390f30352b5cc0a6e495cb093ec3a637589086f4abc249d5c6f8affe2c86243d026d2f873857

      • C:\Program Files\kablife1.exe

        Filesize

        735KB

        MD5

        de23d569b50a2b684a163818a2daf71f

        SHA1

        d269320b087a99fbbd2bbba297c121b12b8d47a2

        SHA256

        938fa8cd23f3fc51be3106eb8991a2bed9c4dac188f4eaa708585ad83f4356f9

        SHA512

        81c3e2541603ac359e622bed6eb0c9496bf94b249b64a6c60d1ec5f081982968e2c7743c0d0f92d3c05282379c00ae378c3c5d2cb4aa7a8827ce902211a435e7

      • memory/3420-10-0x0000000000400000-0x00000000004C0000-memory.dmp

        Filesize

        768KB

      • memory/3696-9-0x0000000000610000-0x0000000000611000-memory.dmp

        Filesize

        4KB

      • memory/3696-15-0x0000000000400000-0x00000000004BF200-memory.dmp

        Filesize

        764KB

      • memory/5068-0-0x0000000000400000-0x00000000004BF200-memory.dmp

        Filesize

        764KB

      • memory/5068-1-0x0000000002240000-0x0000000002241000-memory.dmp

        Filesize

        4KB

      • memory/5068-17-0x0000000000400000-0x00000000004BF200-memory.dmp

        Filesize

        764KB