Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 22:39

General

  • Target

    ec52a88ef30346c168c2c933b996c63b_JaffaCakes118.exe

  • Size

    308KB

  • MD5

    ec52a88ef30346c168c2c933b996c63b

  • SHA1

    c5238d5987c41c4420ee9dc8baf67ae29203e58a

  • SHA256

    b9900779a43961ddcbfbd22772d83e91b0dbb79904e93df622671f3b35c80bc3

  • SHA512

    98fdc05208025b81c91d76a86da031c76a43d6a0b4a52e1a4cf1d8e03da21e82b28339e2639522d6ed1c5a1bc832927fcb03c36c6904de8ef6186854503465c6

  • SSDEEP

    6144:F605Ug4F+2sespYsG14nCBKoJvJtsls4ZDsS4MbqFFUDjY0sQPp:n5Ugaw1GWC7B6lLhsS4zIDjSQ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec52a88ef30346c168c2c933b996c63b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec52a88ef30346c168c2c933b996c63b_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Program Files\explorer.bat
      "C:\Program Files\explorer.bat"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3812
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3812 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:856
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files\SxDel.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\SxDel.bat

    Filesize

    212B

    MD5

    772dd481af4b789e53946394d225f25e

    SHA1

    297a1a69422fb48cd3262662922e0fa757b11a22

    SHA256

    45377b00824bbc3dc2aaff0b1664e753dec508b5f888aa13c48dd14a0faca008

    SHA512

    838137335aac310f5c7ad4523f32e68063df97db65804609f6e28299346d619327b5da1710b3909b48b1bbd4d7e7d6899f256cab232e6f7db225ae910cf27972

  • C:\Program Files\explorer.bat

    Filesize

    308KB

    MD5

    ec52a88ef30346c168c2c933b996c63b

    SHA1

    c5238d5987c41c4420ee9dc8baf67ae29203e58a

    SHA256

    b9900779a43961ddcbfbd22772d83e91b0dbb79904e93df622671f3b35c80bc3

    SHA512

    98fdc05208025b81c91d76a86da031c76a43d6a0b4a52e1a4cf1d8e03da21e82b28339e2639522d6ed1c5a1bc832927fcb03c36c6904de8ef6186854503465c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    d05db975cf07282910d2eeaf4d1d6e0a

    SHA1

    ee43161120259ffd9a634c71ad97a786a228c559

    SHA256

    3198a8f5168605583124b415310f2b135b6233cd3ff9d3bec9b064d609f86e5e

    SHA512

    c0aeba576a2b4baa4c38b4b4176137c3c72a426e222cf16424e333cbeb16e559499fa9c70d200adcd71bb012c35e65478772879071c80f7f9a2b945c9f6c0f3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    d88e361279c80f12000f02163947cc4c

    SHA1

    99012e9e96df314b32fca50e84614419120da37d

    SHA256

    1fbce6c34dfd1b51240ca87612971c22f0751e1273ff788ab034f466348a1c8c

    SHA512

    3dea711b657178c21ea29c85f214c1813a6767afdceece4bedb6efdfb7e037215a238d53a73c2a54c6f2e55002b6f41460b9bc3666bcff2ab20480bd50e08364

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GENTSNHI\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/3812-9-0x00000000003A0000-0x00000000004F4000-memory.dmp

    Filesize

    1.3MB

  • memory/4116-8-0x0000000000830000-0x0000000000831000-memory.dmp

    Filesize

    4KB

  • memory/4116-12-0x0000000000400000-0x0000000000553210-memory.dmp

    Filesize

    1.3MB

  • memory/4916-0-0x0000000000400000-0x0000000000553210-memory.dmp

    Filesize

    1.3MB

  • memory/4916-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/4916-2-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/4916-13-0x0000000000400000-0x0000000000553210-memory.dmp

    Filesize

    1.3MB