Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:43

General

  • Target

    e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe

  • Size

    80KB

  • MD5

    e8d5a2124e4f77d25ebaf12fd9ceb6ec

  • SHA1

    af0f4b79a29cd6cc261578b8670468f0a30ef849

  • SHA256

    6ec8f287f96a2504d7e4537c4cee776097e5e2ed9cb55d105fdc11c1c31977f5

  • SHA512

    b2ca0ac74ed9253fa157bd45ecd0a1094673fb04694ad4245b2257a8526dc582b1ce3ee4053ad353e39c95cdf81e1cab978e79c5ace08f353b3e03852408a8b8

  • SSDEEP

    1536:hwRwO4AXSz2ALVuJtOUi4SVSnLto+BlQRUb3eMHIE62Wnouy82:6Rw1BKTxi4K+BlCUbepE61out2

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 13 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8d5a2124e4f77d25ebaf12fd9ceb6ec_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\SysWOW64\wins\setup\msmgrs.exe
      "C:\Windows\system32\wins\setup\msmgrs.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/JaguarEditControl.dll
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:280
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /u /s C:\Windows/"Downloaded Program Files"/JaguarEditControl.dll
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2704
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe + command.com /c regsvr32 /u /s %WINDIR%/"Downloaded Program Files"/tebedit.ocx
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:308
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 /u /s C:\Windows/"Downloaded Program Files"/tebedit.ocx
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\wins\setup\msmgrs.exe

    Filesize

    80KB

    MD5

    e8d5a2124e4f77d25ebaf12fd9ceb6ec

    SHA1

    af0f4b79a29cd6cc261578b8670468f0a30ef849

    SHA256

    6ec8f287f96a2504d7e4537c4cee776097e5e2ed9cb55d105fdc11c1c31977f5

    SHA512

    b2ca0ac74ed9253fa157bd45ecd0a1094673fb04694ad4245b2257a8526dc582b1ce3ee4053ad353e39c95cdf81e1cab978e79c5ace08f353b3e03852408a8b8

  • memory/2100-25-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-20-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-13-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-29-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-22-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-16-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-28-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-21-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-27-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-23-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-24-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2100-26-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2552-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2552-15-0x0000000002DC0000-0x0000000002DF9000-memory.dmp

    Filesize

    228KB

  • memory/2552-10-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2552-11-0x0000000002DC0000-0x0000000002DF9000-memory.dmp

    Filesize

    228KB