Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 01:08

General

  • Target

    ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    ec8a75d9f4a68aba550ed977b4c46338

  • SHA1

    5e03b977aa2471ffd0f66f3075614dfcf0d1ea74

  • SHA256

    59d6bf9401c5c406397cf29ebe1a3b5c7a071ee4a2c6ff423dfe103b16d06752

  • SHA512

    61239cdd94c47dec7078409f3514d34353d8007f8fb7f849c40d83660eedc880c2ea23920a054d9be9c202b3263f312ab004a98fcf06d1f94fd6ca55e3fc9d20

  • SSDEEP

    384:sTFJ4v3vhO//Xs15JVVorU8a1wNEz4FLjc8W7Q36umLy2v+3iKwKwjjrAEi:sT7QSk/jfZ0FLHOQ36P7d/vni

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Users\Admin\AppData\Local\Temp\isilis.exe
      "C:\Users\Admin\AppData\Local\Temp\isilis.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Users\Admin\AppData\Local\Temp\isilis.exe
        "C:\Users\Admin\AppData\Local\Temp\isilis.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\isilis.exe

    Filesize

    22KB

    MD5

    f101431a309a8878814cf361b695ff15

    SHA1

    7046c3acaa39f67f8a7fe99603781da4efa2d9ef

    SHA256

    4ada327ca2cb6da54dbc8faadc87a77d7741336103c94e9156059610910b6e14

    SHA512

    92ba81b13c23dd91737355bd2669b4dfff8f5f7b7c670dde4527eec87d03ab9b0b154dfa9476ee5769105e16bd1f7a3a81df4e0f07f055f50ecf6e8db26ae5c1

  • memory/1776-17-0x0000000000200000-0x000000000020D000-memory.dmp

    Filesize

    52KB

  • memory/1928-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2384-20-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/2384-19-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/2384-18-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/2384-15-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/2384-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2384-12-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB

  • memory/2384-21-0x0000000000400000-0x0000000000602000-memory.dmp

    Filesize

    2.0MB