Analysis

  • max time kernel
    95s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 14:05

General

  • Target

    edc040dc13cdb329193fbcfd66db333d_JaffaCakes118.exe

  • Size

    635KB

  • MD5

    edc040dc13cdb329193fbcfd66db333d

  • SHA1

    b48149fb79af74be788e9a60c72f5aa15789697d

  • SHA256

    4656239a06f7d320c2039e68bba9e346730d010159d5a1a4ee1c5433727dd8c6

  • SHA512

    dccdc613f485d4102871d4da54a674370b0b023f6194f3dcd7c80bcb49455e3ef8e94ceef7fb03d2c14bccb6e3ae6000a7acc9a3b08a3128f285a1b820e7317d

  • SSDEEP

    12288:fBdYOEWnNSVJyOdIRg0P4sXMyu04Pl8urL5Td/8phK4c1z1EPm:frYOvSVJxdyg0AsXMx04t8uldkphK42b

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edc040dc13cdb329193fbcfd66db333d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edc040dc13cdb329193fbcfd66db333d_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\system32\calc.exe"
        3⤵
          PID:1680
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 12
            4⤵
            • Program crash
            PID:4856
        • C:\Windows\SysWOW64\mstsc.exe
          "C:\Windows\system32\mstsc.exe"
          3⤵
          • Suspicious use of UnmapMainImage
          PID:4496
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 12
            4⤵
            • Program crash
            PID:3552
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1680 -ip 1680
      1⤵
        PID:2732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4496 -ip 4496
        1⤵
          PID:2140

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat

          Filesize

          212B

          MD5

          9e9e836097ad9f2f4577925bcea05fb4

          SHA1

          96340f6bd6ef98d4a341fefff4f79b4e1c992b78

          SHA256

          85de8d625d118bde509012efe368145398fa65cb5c4a9744a7cbc5bb1cdaa7a7

          SHA512

          bfb0165ce9d20dc3d58964ac374a9f8e45dc9dfb8500417f20de507671ff607a3ea3ebbcb97d9db65d23f565b6cbf2cb16f67769f6c7f24c5b4296f382a7b82c

        • F:\svchost.exe

          Filesize

          635KB

          MD5

          edc040dc13cdb329193fbcfd66db333d

          SHA1

          b48149fb79af74be788e9a60c72f5aa15789697d

          SHA256

          4656239a06f7d320c2039e68bba9e346730d010159d5a1a4ee1c5433727dd8c6

          SHA512

          dccdc613f485d4102871d4da54a674370b0b023f6194f3dcd7c80bcb49455e3ef8e94ceef7fb03d2c14bccb6e3ae6000a7acc9a3b08a3128f285a1b820e7317d

        • memory/1680-50-0x0000000000400000-0x00000000005BB000-memory.dmp

          Filesize

          1.7MB

        • memory/2164-16-0x0000000003570000-0x0000000003571000-memory.dmp

          Filesize

          4KB

        • memory/2164-57-0x0000000000400000-0x00000000005BB000-memory.dmp

          Filesize

          1.7MB

        • memory/2164-26-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-25-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-24-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-33-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-32-0x0000000003570000-0x0000000003571000-memory.dmp

          Filesize

          4KB

        • memory/2164-31-0x0000000003580000-0x0000000003581000-memory.dmp

          Filesize

          4KB

        • memory/2164-15-0x0000000003570000-0x0000000003571000-memory.dmp

          Filesize

          4KB

        • memory/2164-29-0x0000000000B80000-0x0000000000B81000-memory.dmp

          Filesize

          4KB

        • memory/2164-23-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-22-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-21-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-20-0x0000000003660000-0x0000000003661000-memory.dmp

          Filesize

          4KB

        • memory/2164-19-0x0000000003560000-0x0000000003561000-memory.dmp

          Filesize

          4KB

        • memory/2164-18-0x0000000003570000-0x0000000003571000-memory.dmp

          Filesize

          4KB

        • memory/2164-17-0x0000000003570000-0x0000000003571000-memory.dmp

          Filesize

          4KB

        • memory/2164-0-0x0000000000400000-0x00000000005BB000-memory.dmp

          Filesize

          1.7MB

        • memory/2164-30-0x0000000000B90000-0x0000000000B91000-memory.dmp

          Filesize

          4KB

        • memory/2164-28-0x00000000035B0000-0x00000000035B1000-memory.dmp

          Filesize

          4KB

        • memory/2164-8-0x00000000025E0000-0x00000000025E1000-memory.dmp

          Filesize

          4KB

        • memory/2164-12-0x0000000003560000-0x0000000003660000-memory.dmp

          Filesize

          1024KB

        • memory/2164-11-0x0000000002590000-0x0000000002591000-memory.dmp

          Filesize

          4KB

        • memory/2164-10-0x0000000002600000-0x0000000002601000-memory.dmp

          Filesize

          4KB

        • memory/2164-9-0x00000000025D0000-0x00000000025D1000-memory.dmp

          Filesize

          4KB

        • memory/2164-13-0x0000000003570000-0x0000000003571000-memory.dmp

          Filesize

          4KB

        • memory/2164-7-0x0000000002570000-0x0000000002571000-memory.dmp

          Filesize

          4KB

        • memory/2164-6-0x0000000002580000-0x0000000002581000-memory.dmp

          Filesize

          4KB

        • memory/2164-5-0x00000000025F0000-0x00000000025F1000-memory.dmp

          Filesize

          4KB

        • memory/2164-4-0x00000000025A0000-0x00000000025A1000-memory.dmp

          Filesize

          4KB

        • memory/2164-3-0x00000000025C0000-0x00000000025C1000-memory.dmp

          Filesize

          4KB

        • memory/2164-27-0x0000000003560000-0x0000000003563000-memory.dmp

          Filesize

          12KB

        • memory/2164-1-0x0000000000B80000-0x0000000000B81000-memory.dmp

          Filesize

          4KB

        • memory/2164-2-0x0000000002400000-0x0000000002454000-memory.dmp

          Filesize

          336KB

        • memory/2164-14-0x0000000003570000-0x0000000003571000-memory.dmp

          Filesize

          4KB

        • memory/2164-56-0x0000000002400000-0x0000000002454000-memory.dmp

          Filesize

          336KB

        • memory/2956-55-0x0000000000400000-0x00000000005BB000-memory.dmp

          Filesize

          1.7MB

        • memory/2956-47-0x0000000000400000-0x00000000005BB000-memory.dmp

          Filesize

          1.7MB