Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 04:42

General

  • Target

    e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    e85a11e6222ea006a368a95d21dabd34

  • SHA1

    aecae899106fb174e542ca97e3eb8c5ea147f071

  • SHA256

    a466539b34a42c8b990bf77251c40561e3817e8f046849647dbe1de6a0c75ef6

  • SHA512

    1e03626e6382fb852aba5d3ed6b5d2d4069d4c28f7d8b596399695df891727be755b878d831334c7b31fef51bd5eb399e2f54650234ed4380c2b24bd7dcd7c2d

  • SSDEEP

    3072:WZPWzKm5YbycJkn+6FAkKxwstpoFOEDUj0xXu3B/5:Y+V21kndTKtGfIjB/5

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\e85a11e6222ea006a368a95d21dabd34_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2312-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2312-9-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-15-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-16-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-8-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-7-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-6-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-4-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-17-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB

    • memory/2312-2-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-14-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-13-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-12-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-27-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2312-18-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB