Analysis

  • max time kernel
    95s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 01:08

General

  • Target

    ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe

  • Size

    31KB

  • MD5

    ec8a75d9f4a68aba550ed977b4c46338

  • SHA1

    5e03b977aa2471ffd0f66f3075614dfcf0d1ea74

  • SHA256

    59d6bf9401c5c406397cf29ebe1a3b5c7a071ee4a2c6ff423dfe103b16d06752

  • SHA512

    61239cdd94c47dec7078409f3514d34353d8007f8fb7f849c40d83660eedc880c2ea23920a054d9be9c202b3263f312ab004a98fcf06d1f94fd6ca55e3fc9d20

  • SSDEEP

    384:sTFJ4v3vhO//Xs15JVVorU8a1wNEz4FLjc8W7Q36umLy2v+3iKwKwjjrAEi:sT7QSk/jfZ0FLHOQ36P7d/vni

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec8a75d9f4a68aba550ed977b4c46338_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:492
    • C:\Users\Admin\AppData\Local\Temp\isilis.exe
      "C:\Users\Admin\AppData\Local\Temp\isilis.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Users\Admin\AppData\Local\Temp\isilis.exe
        "C:\Users\Admin\AppData\Local\Temp\isilis.exe"
        3⤵
        • Executes dropped EXE
        PID:3416
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 80
          4⤵
          • Program crash
          PID:3628
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3416 -ip 3416
    1⤵
      PID:4640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\isilis.exe

      Filesize

      22KB

      MD5

      f101431a309a8878814cf361b695ff15

      SHA1

      7046c3acaa39f67f8a7fe99603781da4efa2d9ef

      SHA256

      4ada327ca2cb6da54dbc8faadc87a77d7741336103c94e9156059610910b6e14

      SHA512

      92ba81b13c23dd91737355bd2669b4dfff8f5f7b7c670dde4527eec87d03ab9b0b154dfa9476ee5769105e16bd1f7a3a81df4e0f07f055f50ecf6e8db26ae5c1

    • memory/492-9-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3928-11-0x0000000000200000-0x000000000020D000-memory.dmp

      Filesize

      52KB