Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 21:55

General

  • Target

    e5a20c12cde4cf74036482dc9e979f11_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    e5a20c12cde4cf74036482dc9e979f11

  • SHA1

    6a3d86e2bb27849d97cad17cb8e32ced3391a3eb

  • SHA256

    dc40ab34a74b027dd88b46eed0a43aecdc8d5e6ba65da291cc4e233ed29a7920

  • SHA512

    12476daa6492dd30b45828d5cd259c4493a0ee42451def64a5d1db28f4858941b74a78479d6290b36cfb8eeaeadab1e77c2f731faa11b95e9f432140e19a2be7

  • SSDEEP

    24576:0wQAz+8160S36egiMymL8LXk4ZbvMiftEbj8dmz5xBnqEPcjh/Py:0lAF60uYipmL8FBt126Ic9/K

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • ModiLoader Second Stage 6 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5a20c12cde4cf74036482dc9e979f11_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e5a20c12cde4cf74036482dc9e979f11_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Users\Admin\AppData\Local\Temp\e5a20c12cde4cf74036482dc9e979f11_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e5a20c12cde4cf74036482dc9e979f11_JaffaCakes118.exe
      2⤵
      • Modifies WinLogon for persistence
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:932
      • C:\Windows\SysWOW64\CODERZ-INC ROOM BOOTER V3 CODERZ-INC.EXE
        "C:\Windows\system32\CODERZ-INC ROOM BOOTER V3 CODERZ-INC.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2296
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\SysWOW64\CODERZ-INC ROOM BOOTER V3 CODERZ-INC.EXE

      Filesize

      480KB

      MD5

      e188bde7a2760da288d1a842649ce53b

      SHA1

      5f3986a75523dba3e757efbc0ec55dc4fa237501

      SHA256

      ec040ba14cbee5caca89d4a2a0f480ddbcb8bdf7e08aa621319224f4781976bc

      SHA512

      3e192ff6bcd07f6a6a1c3c3bec732d9f7758ff33aedda30e1f794ae59ed57d4270e8a7e5e0345accb4ad1061296f6549c4f8c781d1a460eb5da3b51ce6b8cc80

    • memory/932-4-0x0000000000400000-0x00000000004AD000-memory.dmp

      Filesize

      692KB

    • memory/932-7-0x0000000000400000-0x00000000004AD000-memory.dmp

      Filesize

      692KB

    • memory/932-6-0x0000000000400000-0x00000000004AD000-memory.dmp

      Filesize

      692KB

    • memory/932-5-0x0000000000400000-0x00000000004AD000-memory.dmp

      Filesize

      692KB

    • memory/932-9-0x0000000000400000-0x00000000004AD000-memory.dmp

      Filesize

      692KB

    • memory/932-19-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB

    • memory/932-29-0x0000000000400000-0x00000000004AD000-memory.dmp

      Filesize

      692KB

    • memory/948-0-0x0000000000400000-0x00000000007AD000-memory.dmp

      Filesize

      3.7MB

    • memory/948-8-0x0000000000400000-0x00000000007AD000-memory.dmp

      Filesize

      3.7MB