Analysis

  • max time kernel
    95s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 03:14

General

  • Target

    e8383504f36240426097c92991eec3cc_JaffaCakes118.exe

  • Size

    524KB

  • MD5

    e8383504f36240426097c92991eec3cc

  • SHA1

    2a3ef46a821ec67b7ac9072b87d648afa579bae8

  • SHA256

    8612ad9ba5ff323d1dc0c7d20157ecc7887d30a7c30a9066aba7df022a564b10

  • SHA512

    cfdf036b870c27599352076cba24aea7401962577b3e4aed06956fc453db992c6bf6b2778db8699fe6d5e456c7ab642b57ac7a722345c3e10821a44b118444d7

  • SSDEEP

    12288:rJ7OMnt1yNDoFpqYPYtuNokArLDUl7WcNoltnp1G:r5OMt1UwEYAkArLjDtrG

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 13 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8383504f36240426097c92991eec3cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8383504f36240426097c92991eec3cc_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2.exe

    Filesize

    464KB

    MD5

    e9b8c6e0ae438af569ac452e2f8a5991

    SHA1

    dc028b42fbb3c29bf5219eb1ddfc3a8217a107d3

    SHA256

    3d2dfa98e38177cb20ec605afc919c918cc5433ce37379a85c4fd162ebd29ce5

    SHA512

    0a87cf67002e0f6bc2041a6955eb6a57210fc13af66a50b9bcbb249721e2939cb8dd99172af32ca4371af2765525f4e55bf5778a683c2ce0fccb0e4a0a498a52

  • memory/2740-20-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2740-31-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2740-30-0x0000000000530000-0x0000000000569000-memory.dmp

    Filesize

    228KB

  • memory/2740-28-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2740-27-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2740-26-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2740-22-0x0000000004780000-0x0000000004781000-memory.dmp

    Filesize

    4KB

  • memory/2740-23-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2740-24-0x0000000000530000-0x0000000000569000-memory.dmp

    Filesize

    228KB

  • memory/2740-25-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/2740-21-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/3324-9-0x0000000003D00000-0x0000000003D01000-memory.dmp

    Filesize

    4KB

  • memory/3324-17-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/3324-14-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/3324-13-0x0000000002030000-0x0000000002069000-memory.dmp

    Filesize

    228KB

  • memory/3324-12-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/3324-10-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/3324-11-0x0000000002030000-0x0000000002069000-memory.dmp

    Filesize

    228KB

  • memory/3324-8-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB

  • memory/3324-7-0x0000000020001000-0x0000000020004000-memory.dmp

    Filesize

    12KB

  • memory/3324-6-0x0000000002030000-0x0000000002069000-memory.dmp

    Filesize

    228KB

  • memory/3324-5-0x0000000020000000-0x00000000200B5000-memory.dmp

    Filesize

    724KB