Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 03:14

General

  • Target

    e8383504f36240426097c92991eec3cc_JaffaCakes118.exe

  • Size

    524KB

  • MD5

    e8383504f36240426097c92991eec3cc

  • SHA1

    2a3ef46a821ec67b7ac9072b87d648afa579bae8

  • SHA256

    8612ad9ba5ff323d1dc0c7d20157ecc7887d30a7c30a9066aba7df022a564b10

  • SHA512

    cfdf036b870c27599352076cba24aea7401962577b3e4aed06956fc453db992c6bf6b2778db8699fe6d5e456c7ab642b57ac7a722345c3e10821a44b118444d7

  • SSDEEP

    12288:rJ7OMnt1yNDoFpqYPYtuNokArLDUl7WcNoltnp1G:r5OMt1UwEYAkArLjDtrG

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8383504f36240426097c92991eec3cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8383504f36240426097c92991eec3cc_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe

    Filesize

    464KB

    MD5

    e9b8c6e0ae438af569ac452e2f8a5991

    SHA1

    dc028b42fbb3c29bf5219eb1ddfc3a8217a107d3

    SHA256

    3d2dfa98e38177cb20ec605afc919c918cc5433ce37379a85c4fd162ebd29ce5

    SHA512

    0a87cf67002e0f6bc2041a6955eb6a57210fc13af66a50b9bcbb249721e2939cb8dd99172af32ca4371af2765525f4e55bf5778a683c2ce0fccb0e4a0a498a52

  • memory/2088-26-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2088-8-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2088-30-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2572-38-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2572-37-0x0000000000300000-0x0000000000339000-memory.dmp

    Filesize

    228KB

  • memory/2572-35-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2572-34-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2572-33-0x0000000000300000-0x0000000000339000-memory.dmp

    Filesize

    228KB

  • memory/2572-32-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2572-31-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/2572-28-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2692-15-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/2692-23-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2692-20-0x00000000002F0000-0x0000000000329000-memory.dmp

    Filesize

    228KB

  • memory/2692-19-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2692-18-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2692-17-0x00000000002F0000-0x0000000000329000-memory.dmp

    Filesize

    228KB

  • memory/2692-16-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2692-14-0x0000000020001000-0x0000000020004000-memory.dmp

    Filesize

    12KB

  • memory/2692-13-0x00000000002F0000-0x0000000000329000-memory.dmp

    Filesize

    228KB

  • memory/2692-12-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB