Analysis

  • max time kernel
    6s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 20:05

General

  • Target

    e9e23dfd49a971a434d8e7d9a02a4d8a_JaffaCakes118.exe

  • Size

    130KB

  • MD5

    e9e23dfd49a971a434d8e7d9a02a4d8a

  • SHA1

    4637c95879ad125e2caf126a74ebb1ec8c0fadf4

  • SHA256

    5f6b98e16d8971675a8baefb3f32cee09b611946196e8cbc51c0364fa516f21a

  • SHA512

    ba044875ed06249b3962a785e78fae468f94dde7ac547c809907c8fdcd18eb7e1fa387e5455d904196161f05765309e2d71dbf2b5558ac777261662336109193

  • SSDEEP

    1536:ctZUV8GeJ+Bspr7FvXWIDFj8LMIvk2yu7GSPT3MexuvRAE1jWQQPUkXas5COP:SLikpXLDGLMIvn7GQMlRAE1jWQ4as5tP

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 15 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9e23dfd49a971a434d8e7d9a02a4d8a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9e23dfd49a971a434d8e7d9a02a4d8a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\Exporer32.exe
      "C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Exporer32.exe

    Filesize

    46KB

    MD5

    2bb7ab177763ef23fb27a9730c474451

    SHA1

    2075545d9d74cff99db6e5cc1b0147065a709d6b

    SHA256

    8180d38871e8ec07683896f4b4210f695819309b135b4ea4ef6b8da257d3cbef

    SHA512

    91e83e34b8c2b21280b3511798d05e6d472779701ae1612ed08612981aa61ecb4722c13aca83727fac02342550a1f00b2a21f35b5852c0653e55b01831250a91

  • memory/2816-11-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-12-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-13-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-14-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-15-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-16-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-17-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-18-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-19-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-20-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-21-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-22-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-23-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2816-24-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB