Analysis

  • max time kernel
    125s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2024 21:23

General

  • Target

    f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe

  • Size

    108KB

  • MD5

    f486cf57667a5744f4766845c985b27b

  • SHA1

    f03354122b727edc2d9b59c8088b7ac78594f40f

  • SHA256

    380cba82072d88e4ae81afaac03b8966b7ec926ec0d57efcd658e36bd89e644d

  • SHA512

    df3d4f110567c6a4e511a5d9bfed696d59588fbdd69ffc2bced9782ee982ce6fff31d550540879c4aeeb92e53dcce0af8e97ebb63569b6e70fb7cb1e0d695f18

  • SSDEEP

    768:pC38yHB1LhnAty+w1yV3B2xr1ux02VczZLJ7ZjhNW5OE58H6Vd2KFRhdARI3v24/:pCRHR51au8fCzD8jo88bB3EjV2lT20KP

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f486cf57667a5744f4766845c985b27b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\LLAMADAMOVISTAR.PPS" /ou ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2528
    • C:\MSN.EXE
      "C:\MSN.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4988
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        C:\Users\Admin\AppData\Local\Temp\tmp.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1192
        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          C:\Users\Admin\AppData\Local\Temp\tmp.exe
          4⤵
          • Executes dropped EXE
          PID:3412
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 460
            5⤵
            • Program crash
            PID:2376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3412 -ip 3412
    1⤵
      PID:3064
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4128 /prefetch:8
      1⤵
        PID:3696

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\LLAMADAMOVISTAR.PPS

        Filesize

        44KB

        MD5

        c1d7b47d6a04e7219dbbf4f024e07eea

        SHA1

        4e4943d54aa9d480f189f5798b85d15d9b0d4393

        SHA256

        a8feede40fdce7fdd13e60b154fb551849627b13b22b37e331028b70750c57a9

        SHA512

        b1eda40aaa4310e688cf227416df9793cfdf1988d2bab285f0efa752f5e941aaf6e50157c8757fb845aa0ad2fc2f7fa1cd33997cf77040fe930c0b6e2d26c289

      • C:\MSN.EXE

        Filesize

        43KB

        MD5

        333affe54f121b640c3fa188bdcc092e

        SHA1

        e3e6d11bef382209f1cceb03affdcf73d620a020

        SHA256

        8e8123969b416a868059ac393537ba4399fb62da8ba1de4c8a9b69ed567865a5

        SHA512

        6b2c2ce8fcc673bf4e4b65880cbf5c6093ab9b232719900a922981d393b3c5e761b8430493751b307e5c531034a879c5f17866274b40d158247feefcbc9e3ca8

      • C:\Users\Admin\AppData\Local\Temp\tmp.exe

        Filesize

        19KB

        MD5

        02583fa70022a563a7673e0e92d41fea

        SHA1

        9e322541ca126ec5efbf2183b115c51c22ffd639

        SHA256

        8ec368aa8bcd5719738e73ba0b20b88a161b2fd17f1287eb22083572311dba89

        SHA512

        609f8021ff55a0dcc9c8a3892a31113d7eacc84f16defbb798003191b9380d4baef35b2f36d13a06bedbcad580fa5989910815d0d273101713bb0d151bbdf313

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        460B

        MD5

        861861516f896c28dec758e0abca0bc9

        SHA1

        1b363c5b504cb7724936563fa0557913b0966a37

        SHA256

        befb501815fb0d16dc85d6df98b75681bc6b8273526f62236d2c66fa66fc3efb

        SHA512

        ae5a387184a482671910112fbb4cfa4fbd708d911a24e40ca72d5ef0b8f45e9c836a49ee1625a24fedb993e3c2bdbae734d9d787a353f2c0741412b91ad776e3

      • memory/1192-36-0x0000000010000000-0x000000001000C000-memory.dmp

        Filesize

        48KB

      • memory/1700-13-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2528-40-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-72-0x00007FFC0CB8D000-0x00007FFC0CB8E000-memory.dmp

        Filesize

        4KB

      • memory/2528-22-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-23-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-29-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-34-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-19-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-37-0x00007FFBCA210000-0x00007FFBCA220000-memory.dmp

        Filesize

        64KB

      • memory/2528-39-0x00007FFBCA210000-0x00007FFBCA220000-memory.dmp

        Filesize

        64KB

      • memory/2528-38-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-20-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-35-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-42-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-87-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-41-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-84-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-17-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-28-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-86-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-18-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-16-0x00007FFC0CB8D000-0x00007FFC0CB8E000-memory.dmp

        Filesize

        4KB

      • memory/2528-71-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-15-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-75-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB

      • memory/2528-83-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/2528-85-0x00007FFBCCB70000-0x00007FFBCCB80000-memory.dmp

        Filesize

        64KB

      • memory/3412-30-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB

      • memory/3412-33-0x0000000000400000-0x0000000000403000-memory.dmp

        Filesize

        12KB

      • memory/3412-43-0x00007FFC0CAF0000-0x00007FFC0CCE5000-memory.dmp

        Filesize

        2.0MB