Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 04:39

General

  • Target

    e8591122f91c93f57c49b5aae01d6300_JaffaCakes118.exe

  • Size

    506KB

  • MD5

    e8591122f91c93f57c49b5aae01d6300

  • SHA1

    ce5d5cca53bb35bad06f4f9a438271d1688f40f5

  • SHA256

    d8537e3cdfa869c8f59d43661d4089526d8dff08bbf9a1d69e3aa74b3868977e

  • SHA512

    02d479d22cad319a52c9722c26fcda935b6f3111a92dabf031dfda933e3d1b5b959c5727557ee87aa59b72edd73aef3dfd5d1a5c29f1e47b7545abf470c10a1f

  • SSDEEP

    12288:qc//////8wTHpCFUqKmzI65ms5E80RqzP1EY8MMLsiIq3NB5WNAz06AIFKQ:qc//////hTHfADe80RqWY8L+mNB5WqAM

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8591122f91c93f57c49b5aae01d6300_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8591122f91c93f57c49b5aae01d6300_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:468
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\OK.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Users\Admin\AppData\Local\Temp\OK.exe
        C:\Users\Admin\AppData\Local\Temp\OK.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          4⤵
            PID:2900
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\http_imgload.jpg"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1392
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2524

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\http_imgload.jpg

      Filesize

      40KB

      MD5

      cd0cdc47991635dd9541b59a7eaffd34

      SHA1

      fb7ee061dd3d1e4206b677d87b67499562c05a7d

      SHA256

      ff8361c6dcff474f02da9d657039d9e559d87a41150315eef159cb7d33ef51db

      SHA512

      42a1401e098dc1773dcab627734b7d501648e3215061091f51a7b28f2efd42289a784473ef462a64f0fc9f2786caefef9a411904c2c3c9c7d971653a053bab7a

    • \Users\Admin\AppData\Local\Temp\OK.exe

      Filesize

      692KB

      MD5

      ef29a48274cb7e74848ddc3fbd8f434c

      SHA1

      8b3e20391ce140296d92530be5ad11822e3a104f

      SHA256

      6b40ac0c61c9ea52a859fc53ad711d0c33eabbf121dd935b7a0b23941b121da5

      SHA512

      0f8d0091a4d510e61db5b9fa2b993951495f3ec2b8d182d71c3a9a92b9e601ef474568c1a9fe472d1cd0d7d8ed9cb11817c4ef2b01e2a4761e0481cb2e739d7d

    • memory/468-0-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/468-10-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/1392-71-0x00000000002A0000-0x00000000002A2000-memory.dmp

      Filesize

      8KB

    • memory/2116-17-0x0000000000430000-0x00000000004F1000-memory.dmp

      Filesize

      772KB

    • memory/2116-16-0x0000000000430000-0x00000000004F1000-memory.dmp

      Filesize

      772KB

    • memory/2524-72-0x00000000001A0000-0x00000000001A2000-memory.dmp

      Filesize

      8KB

    • memory/2724-18-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2724-40-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2724-47-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB