Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 16:33

General

  • Target

    edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe

  • Size

    540KB

  • MD5

    edfe9a6b0a02570d8696e3df64589ed7

  • SHA1

    6a4c1244019d3fd49a14b38d016c8b8773424a7f

  • SHA256

    d0600a27be2d018bd6b92c965636111f2c0e53dcc42d4a698e794b74a1a51b55

  • SHA512

    90325d9e80f08f2059c1e4cb529867c42034bdf3612eda3ca4d314d6c53b61fa8da12ae8d2fee2b1038cc390638047a611eed8c6476ed973a02c3469b6f1ed0f

  • SSDEEP

    12288:AJZUQeM0tKPfjX3c3EvvJF3Z4mxx5s5fGUiAoXr635ZLIONd1d:AoM0EPLmkvJQmXqIUiAoXr637LIod1d

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edfe9a6b0a02570d8696e3df64589ed7_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\ddos2.exe
      C:\Windows\system32\ddos2.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:4116
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Deleteme.bat

    Filesize

    212B

    MD5

    2e530892fc270eaa67cf9c79f4ec7569

    SHA1

    632020593924d0fbde3f03183bce04c589b4d68b

    SHA256

    9b50a328546e79410515a703fc9fb727568c6ddb6003cc443571c69ace69d018

    SHA512

    0a0886f08067cb1360cd6a013ddddad5aeaee357c8a1abd590a8ec7322ce675bebb8701737bc3419817226f687fc92978c5c7be17f2989c2bf78f7cb24e49d27

  • C:\Windows\SysWOW64\ddos2.exe

    Filesize

    540KB

    MD5

    edfe9a6b0a02570d8696e3df64589ed7

    SHA1

    6a4c1244019d3fd49a14b38d016c8b8773424a7f

    SHA256

    d0600a27be2d018bd6b92c965636111f2c0e53dcc42d4a698e794b74a1a51b55

    SHA512

    90325d9e80f08f2059c1e4cb529867c42034bdf3612eda3ca4d314d6c53b61fa8da12ae8d2fee2b1038cc390638047a611eed8c6476ed973a02c3469b6f1ed0f

  • memory/3160-14-0x00000000034F0000-0x00000000035F0000-memory.dmp

    Filesize

    1024KB

  • memory/3160-10-0x0000000002490000-0x0000000002491000-memory.dmp

    Filesize

    4KB

  • memory/3160-18-0x00000000034F0000-0x00000000035F0000-memory.dmp

    Filesize

    1024KB

  • memory/3160-12-0x0000000003460000-0x0000000003463000-memory.dmp

    Filesize

    12KB

  • memory/3160-19-0x00000000034F0000-0x00000000035F0000-memory.dmp

    Filesize

    1024KB

  • memory/3160-9-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/3160-7-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/3160-8-0x00000000024D0000-0x00000000024D1000-memory.dmp

    Filesize

    4KB

  • memory/3160-5-0x0000000002480000-0x0000000002481000-memory.dmp

    Filesize

    4KB

  • memory/3160-4-0x00000000024F0000-0x00000000024F1000-memory.dmp

    Filesize

    4KB

  • memory/3160-3-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB

  • memory/3160-20-0x00000000034F0000-0x00000000035F0000-memory.dmp

    Filesize

    1024KB

  • memory/3160-0-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/3160-15-0x00000000034F0000-0x00000000035F0000-memory.dmp

    Filesize

    1024KB

  • memory/3160-13-0x00000000034D0000-0x00000000034D1000-memory.dmp

    Filesize

    4KB

  • memory/3160-11-0x0000000003470000-0x0000000003471000-memory.dmp

    Filesize

    4KB

  • memory/3160-2-0x00000000024C0000-0x00000000024C1000-memory.dmp

    Filesize

    4KB

  • memory/3160-21-0x00000000034F0000-0x00000000035F0000-memory.dmp

    Filesize

    1024KB

  • memory/3160-26-0x0000000003480000-0x0000000003481000-memory.dmp

    Filesize

    4KB

  • memory/3160-25-0x0000000003490000-0x0000000003491000-memory.dmp

    Filesize

    4KB

  • memory/3160-24-0x00000000034A0000-0x00000000034A1000-memory.dmp

    Filesize

    4KB

  • memory/3160-23-0x00000000007A0000-0x00000000007A1000-memory.dmp

    Filesize

    4KB

  • memory/3160-22-0x0000000000790000-0x0000000000791000-memory.dmp

    Filesize

    4KB

  • memory/3160-6-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/3160-1-0x00000000022A0000-0x00000000022F4000-memory.dmp

    Filesize

    336KB

  • memory/3160-36-0x00000000022A0000-0x00000000022F4000-memory.dmp

    Filesize

    336KB

  • memory/3160-37-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/4116-34-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB

  • memory/4116-30-0x0000000000400000-0x00000000004E4000-memory.dmp

    Filesize

    912KB