Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 18:57

General

  • Target

    e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe

  • Size

    79KB

  • MD5

    e32d54dae55b9312b249bcb02b2d2d83

  • SHA1

    71b17eabd8cb8c4eda3682560015100483f8e5ec

  • SHA256

    75d693fc9d7d0783284ca48c1b366deaebd5554948233ed8ebdb80cc2ae052c3

  • SHA512

    b36eaa959c9c55ed80574af5cdf8bb3e78098b3b5b00e6c8a2d571bcf384cc17e625b3c52e00010ede242b0b85565d4b7cf9a9dfb59150e52346f4199604c1c7

  • SSDEEP

    1536:EVN9S4A343LR+u+yEfXPqD+ZTIlG4t2yQvOL9cYePa0DJArQ1q5OP4:E0aR+u0XPqD+Z8lG4t2yQvOZ9r1rdOw

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e32d54dae55b9312b249bcb02b2d2d83_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\新建 文本文档.txt
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2568
    • C:\Users\Admin\AppData\Local\Temp\888.exe
      "C:\Users\Admin\AppData\Local\Temp\888.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\新建 文本文档.txt

    Filesize

    11B

    MD5

    2691a2a7f4f47db2258bc2ec63e3f9b5

    SHA1

    7c1779f1033459eb4bb2632714ddd24c3ce234b5

    SHA256

    452ace9d6f0f40998dbaba9a7b65644eb193163ba7c289e9814ce030e8926ab1

    SHA512

    b17976095c01a9c78103105fe559a921dcffe47bb2e733c8e20b09f8efd3e8943924783fb22cab066e3d6231cb144f21d9bbb78fac85308e178cc2d43844ffdc

  • \Program Files\Common Files\Microsoft Shared\MSInfo\SysInfo.dll

    Filesize

    57KB

    MD5

    53c56d2de6c5afb1127b469560a944d7

    SHA1

    f6dedb9e129b3cdd17ac1eeaceb1520160e43452

    SHA256

    d7efe5c0b8a175af3f2748a0c36c669fb0ec5bcdec22a526777cff64dc534013

    SHA512

    61775a5b9647365c8b81cc5eeef360728656d7e989ba448efca5826d49999eecff967c137da21754e7d3ee28664363df8773e2637b6cd4e7228f5de62b627ff1

  • \Users\Admin\AppData\Local\Temp\888.exe

    Filesize

    29KB

    MD5

    8b46abddaa1bbc53d4aebccdc3608387

    SHA1

    2f395f57d768c2fa430bb7a0ad0f1e13a84e959a

    SHA256

    a5debef775f44aadcea210f80ee55c0bdfa6e74c97b0e26e253efcafa899b4a9

    SHA512

    516e189f216d9fc33875d278e08a44ae84c4d051dc9c73e9aea90780aed1d19a16e0e6444a26521a924fc2865f37235db4f7a3bfba5b37d2bb58330938c8b8d8

  • memory/2608-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2608-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2792-0-0x0000000000220000-0x00000000002CC000-memory.dmp

    Filesize

    688KB

  • memory/2792-6-0x00000000023B0000-0x00000000023DA000-memory.dmp

    Filesize

    168KB

  • memory/2792-11-0x00000000023B0000-0x00000000023DA000-memory.dmp

    Filesize

    168KB