Analysis

  • max time kernel
    146s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 00:32

General

  • Target

    ea426e6d819e8e5fb992918e92a618ec_JaffaCakes118.exe

  • Size

    79KB

  • MD5

    ea426e6d819e8e5fb992918e92a618ec

  • SHA1

    0c726aece5b25b66bde0573a3b36664ad1425502

  • SHA256

    21d36c59d1e17b806190ad7610c86c08f40549c92e59deec82a40b046f36d301

  • SHA512

    aa4101dde41b8ccbfe91b6da652c57e15aa963a9448e243f2a5c76f73dd5148f52b4da763c8939f7ed238ba26232067ee5b45d19e202a908045bedf8796890bd

  • SSDEEP

    1536:gyhPiKGK2KapxL2RfDn7xtsWFTP2lZjcjLmlNelfUmwWHpX:taKcZZ2Rb7xBFTP2gXmyNUmfHpX

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 17 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea426e6d819e8e5fb992918e92a618ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea426e6d819e8e5fb992918e92a618ec_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\ea426e6d819e8e5fb992918e92a618ec_JaffaCakes118.exe
      ea426e6d819e8e5fb992918e92a618ec_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Users\Admin\AppData\Roaming\netprotocol.exe
        C:\Users\Admin\AppData\Roaming\netprotocol.exe
        3⤵
        • Executes dropped EXE
        PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    79KB

    MD5

    7541b81a39e6dee7568cc576d7da8a31

    SHA1

    455983bb7d82c64d0287182661fb7c6848c2c37c

    SHA256

    056e52398cbbf09724f986b51e229c0bcf77038d7ccd13a730b9a6247d3be34c

    SHA512

    62794a7a3e84903ba45916d271f4f766c4dc13b750a1d7f1cbbe123e16e9187c1c7e66420b1a2951913b544100f3386ede6e1bf927ae7edbfeed4da1ea4db67e

  • memory/980-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/980-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/980-31-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/980-27-0x0000000000220000-0x0000000000242000-memory.dmp

    Filesize

    136KB

  • memory/980-26-0x0000000000220000-0x0000000000242000-memory.dmp

    Filesize

    136KB

  • memory/980-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/980-3-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/980-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/980-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/980-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2152-29-0x0000000000220000-0x0000000000242000-memory.dmp

    Filesize

    136KB

  • memory/2152-15-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2152-16-0x0000000000220000-0x0000000000242000-memory.dmp

    Filesize

    136KB

  • memory/2152-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-38-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-42-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-28-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-34-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-36-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-30-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-41-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-32-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-43-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-44-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-45-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-46-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-47-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-48-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-49-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2316-50-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB