Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 21:47

General

  • Target

    f490974191ee4b5b217acdad3c4cafa4_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    f490974191ee4b5b217acdad3c4cafa4

  • SHA1

    54db71e3fef3607212019ffe54b0011939757fc5

  • SHA256

    3cc0da4d1397662973ee6c4dad5376edeb3f42817458648283471c485c253319

  • SHA512

    8b24f65348a969531c5b777061a5bb6cb7b5ba478ee47bbab0abe62544e5affddf131ff4b1d4accc26abb77596370d8c3c43b2cc26320bd78ba6d4a8ed163206

  • SSDEEP

    24576:f/nCl2weAWGU2wTv33LwKu0dddpRABAiKqYwY7n7/Skrd8uqyvISpz7n6nhDhTuc:M2pV3iM1RAHKq7Y77/KuqqN7nAhanm

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 21 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f490974191ee4b5b217acdad3c4cafa4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f490974191ee4b5b217acdad3c4cafa4_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\cmsetac.dll

    Filesize

    32KB

    MD5

    707d75b8b5eb1707b03651038cae7314

    SHA1

    0ec57bdda53d8690639d1543997e9b6f64157960

    SHA256

    7294932cc9ad9c13a78556277a2512ed75c7b6f2c1c471b8bca8f579237f3979

    SHA512

    7029c2d44ffec907c1d04ef3f1e2f3e119de295310281362104ce235f792adf559f53da26c2526abdb53fea48ce9c5d7a64c0ecd8c87050858514fce7e5c3802

  • \Users\Admin\AppData\Local\Temp\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/3012-15-0x00000000042F0000-0x00000000042F8000-memory.dmp

    Filesize

    32KB

  • memory/3012-48-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-7-0x0000000004EB0000-0x0000000004EBE000-memory.dmp

    Filesize

    56KB

  • memory/3012-10-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-11-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-12-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-13-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-14-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-16-0x0000000004EB0000-0x0000000004EBE000-memory.dmp

    Filesize

    56KB

  • memory/3012-17-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-54-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-9-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-27-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-24-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-21-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-30-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-33-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-36-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-39-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-42-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-45-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-18-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-51-0x0000000000400000-0x000000000055D000-memory.dmp

    Filesize

    1.4MB

  • memory/3012-0-0x0000000000401000-0x000000000041C000-memory.dmp

    Filesize

    108KB