Analysis

  • max time kernel
    94s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 04:39

General

  • Target

    e8591122f91c93f57c49b5aae01d6300_JaffaCakes118.exe

  • Size

    506KB

  • MD5

    e8591122f91c93f57c49b5aae01d6300

  • SHA1

    ce5d5cca53bb35bad06f4f9a438271d1688f40f5

  • SHA256

    d8537e3cdfa869c8f59d43661d4089526d8dff08bbf9a1d69e3aa74b3868977e

  • SHA512

    02d479d22cad319a52c9722c26fcda935b6f3111a92dabf031dfda933e3d1b5b959c5727557ee87aa59b72edd73aef3dfd5d1a5c29f1e47b7545abf470c10a1f

  • SSDEEP

    12288:qc//////8wTHpCFUqKmzI65ms5E80RqzP1EY8MMLsiIq3NB5WNAz06AIFKQ:qc//////hTHfADe80RqWY8L+mNB5WqAM

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8591122f91c93f57c49b5aae01d6300_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8591122f91c93f57c49b5aae01d6300_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\OK.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\OK.exe
        C:\Users\Admin\AppData\Local\Temp\OK.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2408
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 220
          4⤵
          • Program crash
          PID:2656
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\http_imgload.jpg"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2616
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2408 -ip 2408
    1⤵
      PID:3560

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OK.exe

      Filesize

      692KB

      MD5

      ef29a48274cb7e74848ddc3fbd8f434c

      SHA1

      8b3e20391ce140296d92530be5ad11822e3a104f

      SHA256

      6b40ac0c61c9ea52a859fc53ad711d0c33eabbf121dd935b7a0b23941b121da5

      SHA512

      0f8d0091a4d510e61db5b9fa2b993951495f3ec2b8d182d71c3a9a92b9e601ef474568c1a9fe472d1cd0d7d8ed9cb11817c4ef2b01e2a4761e0481cb2e739d7d

    • memory/2408-13-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/2408-15-0x0000000000400000-0x00000000004C1000-memory.dmp

      Filesize

      772KB

    • memory/3944-0-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB

    • memory/3944-9-0x0000000000400000-0x000000000048E000-memory.dmp

      Filesize

      568KB