Analysis

  • max time kernel
    110s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 08:08

General

  • Target

    f19e1926d98337f7e5080f51103f370a_JaffaCakes118.exe

  • Size

    274KB

  • MD5

    f19e1926d98337f7e5080f51103f370a

  • SHA1

    1b2fe0680f6cfc1f73d935130d982aab50a87c9f

  • SHA256

    633a2ab5e59d3c12518098c6983d03b136af66d3c166ef996a379195904c7dfe

  • SHA512

    2971d6b9e31843602cf59cda9f99a5cb6965b300d09bd14c31818d529a23565c587ba111c602d39547fd45da167d9170485253c0f0d5760fc91fdc245989ae06

  • SSDEEP

    6144:E216IjDTPJY/+qGwV3Pa9V4MUCZ1PgRp+yLhoc+qtKRVqSlHxgX7nEf0h:Es/lYGqBV/i4MUmipVLh0DR4SlHah

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f19e1926d98337f7e5080f51103f370a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f19e1926d98337f7e5080f51103f370a_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Windows\SysWOW64\Bhsrv.exe
      C:\Windows\system32\Bhsrv.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:5176
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\ReDelBat.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ReDelBat.bat

    Filesize

    212B

    MD5

    b32e7483d83e1d8dbee909e1a71583cf

    SHA1

    aa900caf95ced55ff611ea52374d79df11e2904b

    SHA256

    d62ccdd5e8cebfcdb005ad4843ab5e6becb09469b9d0024fe3cd2a9b28786145

    SHA512

    066ac53cf6a6ff8e9c5a31a0ddd665ce5b665503d89d15006856cb0504d04af78636c67005069cc2b5b311c99f53bb11e7b2baa6fb8c5910ce2b71cd4ca08fb6

  • F:\Bhsrv.exe

    Filesize

    274KB

    MD5

    f19e1926d98337f7e5080f51103f370a

    SHA1

    1b2fe0680f6cfc1f73d935130d982aab50a87c9f

    SHA256

    633a2ab5e59d3c12518098c6983d03b136af66d3c166ef996a379195904c7dfe

    SHA512

    2971d6b9e31843602cf59cda9f99a5cb6965b300d09bd14c31818d529a23565c587ba111c602d39547fd45da167d9170485253c0f0d5760fc91fdc245989ae06

  • memory/5040-0-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/5040-1-0x00000000007A0000-0x00000000007A2000-memory.dmp

    Filesize

    8KB

  • memory/5040-3-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/5040-4-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/5040-26-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/5176-18-0x0000000000590000-0x0000000000592000-memory.dmp

    Filesize

    8KB

  • memory/5176-21-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/5176-25-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB