Analysis

  • max time kernel
    143s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 16:26

General

  • Target

    e527d611f42f1473a3d858ce81af35f2_JaffaCakes118.exe

  • Size

    592KB

  • MD5

    e527d611f42f1473a3d858ce81af35f2

  • SHA1

    61d7dff1843bf91696ee48f71e1c8aafe950c7bc

  • SHA256

    9f103cc511813d892dd99048250a8215afb65dc1897db82a8da5cd682cacb7a5

  • SHA512

    18626a08933f2eb5cfeb3fe406526b14cfa6aa31b2deb5ded6d01f48226100dc3189296934be26d9c4bba334541d00f2383460c8456a85d029de3e5ef1073fc4

  • SSDEEP

    12288:tBnMPxpe5awaUa0e1+wwbc+qCHnD1c2obY7cBC1h9GQGv:thExmel1+wwoUocHev

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 59 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e527d611f42f1473a3d858ce81af35f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e527d611f42f1473a3d858ce81af35f2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\e527d611f42f1473a3d858ce81af35f2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e527d611f42f1473a3d858ce81af35f2_JaffaCakes118.exe
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Windows\use.exe
        C:\Windows\use.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Windows\use.exe
          C:\Windows\use.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3612
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 280
            5⤵
            • Program crash
            PID:540
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\SgotoDel.bat
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:3684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SgotoDel.bat

    Filesize

    212B

    MD5

    4558b8a4a5b73b38cbc7ea7b83e953b9

    SHA1

    5aaa899e7ed685afadc2645e3820f818203376fb

    SHA256

    df11a4a45a038fd32bba1fdd13a513790f66c0da0bde73780cdeb8720bcf36c5

    SHA512

    86a4a26ca9222641362123ada17cc74eabd8fe46c9054508ba3587fe4a3540d608c57b5c14ce2029d4131d4ddbaa7278b1ea159e96ea970bffbf3f2168b126b5

  • C:\Windows\use.exe

    Filesize

    592KB

    MD5

    e527d611f42f1473a3d858ce81af35f2

    SHA1

    61d7dff1843bf91696ee48f71e1c8aafe950c7bc

    SHA256

    9f103cc511813d892dd99048250a8215afb65dc1897db82a8da5cd682cacb7a5

    SHA512

    18626a08933f2eb5cfeb3fe406526b14cfa6aa31b2deb5ded6d01f48226100dc3189296934be26d9c4bba334541d00f2383460c8456a85d029de3e5ef1073fc4

  • memory/1268-41-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-61-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-84-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-590-0x0000000000400000-0x00000000004DA27C-memory.dmp

    Filesize

    872KB

  • memory/1268-83-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-82-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-81-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-80-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-79-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-78-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-77-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-76-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-75-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-74-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-73-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-71-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-70-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-69-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-68-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-67-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-66-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-65-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-64-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-62-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-38-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-59-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-58-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-57-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-56-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-55-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-54-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-53-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-52-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-51-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-50-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-48-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-47-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-46-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-39-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-36-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-43-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-42-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-21-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-40-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-45-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-107-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-44-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-37-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-35-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-34-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-33-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-32-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-31-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-30-0x0000000000400000-0x00000000004DA27C-memory.dmp

    Filesize

    872KB

  • memory/1268-29-0x0000000000400000-0x00000000004DA27C-memory.dmp

    Filesize

    872KB

  • memory/1268-28-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-72-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-49-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-23-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1268-630-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-631-0x0000000000400000-0x00000000004DA27C-memory.dmp

    Filesize

    872KB

  • memory/1268-60-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-598-0x0000000002250000-0x00000000022F0000-memory.dmp

    Filesize

    640KB

  • memory/1268-63-0x0000000000400000-0x00000000004DB000-memory.dmp

    Filesize

    876KB

  • memory/1268-597-0x0000000002250000-0x00000000022F0000-memory.dmp

    Filesize

    640KB

  • memory/2120-17-0x0000000002A40000-0x0000000002A45000-memory.dmp

    Filesize

    20KB

  • memory/2120-6-0x0000000000910000-0x0000000000911000-memory.dmp

    Filesize

    4KB

  • memory/2120-15-0x0000000002A50000-0x0000000002A51000-memory.dmp

    Filesize

    4KB

  • memory/2120-12-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2120-11-0x0000000000900000-0x0000000000901000-memory.dmp

    Filesize

    4KB

  • memory/2120-10-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2120-9-0x0000000002A50000-0x0000000002A51000-memory.dmp

    Filesize

    4KB

  • memory/2120-8-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/2120-7-0x0000000000650000-0x0000000000651000-memory.dmp

    Filesize

    4KB

  • memory/2120-3-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2120-13-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2120-14-0x0000000002A50000-0x0000000002A51000-memory.dmp

    Filesize

    4KB

  • memory/2120-2-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2120-4-0x0000000000630000-0x0000000000631000-memory.dmp

    Filesize

    4KB

  • memory/2120-1-0x0000000000270000-0x00000000002C0000-memory.dmp

    Filesize

    320KB

  • memory/2120-16-0x0000000002A50000-0x0000000002A52000-memory.dmp

    Filesize

    8KB

  • memory/2120-18-0x0000000003010000-0x00000000030B0000-memory.dmp

    Filesize

    640KB

  • memory/2120-0-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2120-25-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2120-26-0x0000000000270000-0x00000000002C0000-memory.dmp

    Filesize

    320KB

  • memory/2120-5-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB

  • memory/3572-600-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3572-1184-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB