Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 19:18

General

  • Target

    f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe

  • Size

    253KB

  • MD5

    f6b09f164d9dff2942d2977e10f0f121

  • SHA1

    c7c78e6a15faeb4fc81dce878d629b3ccc0ca811

  • SHA256

    f3a6e5010278054ba42e8c388598096c3d6528cd3550c60b2687c2e4bf0522c3

  • SHA512

    45bc7dd718f4b1bbe2df3e6616b156eb661a40dfa34335a46f1f7f1cb396e9cb51a4970baa9c46387f02518fd5464168b9cb930bf6d2c67e186b79b620455f27

  • SSDEEP

    6144:kRXdt7KzrIU2ykH2ipsPnafFlerkb3LrtoetumddZR6wkB:6z7KzrIjXnOitlt3Noer

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\server.exe
      "C:\Windows\server.exe" \melt "C:\Users\Admin\AppData\Local\Temp\f6b09f164d9dff2942d2977e10f0f121_JaffaCakes118.exe"
      2⤵
      • Adds policy Run key to start application
      • Boot or Logon Autostart Execution: Active Setup
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Maps connected drives based on registry
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:2816

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\PCGWIN32.LI4

      Filesize

      528B

      MD5

      6b09e3c8508a2c393bf3391b4ece0c38

      SHA1

      f5c8ef817ee07685d6824a56d815846dd2a33711

      SHA256

      d0432310c6e74a0f8ef859449c4ef3a986a11d3f35a93d79142f3de3f6fb9c88

      SHA512

      aca63e45c5283f6e432798e6468e0c1a1bfdcd460101991202e64521cb1655daac5c50d48b8c5cd23329e071353d2aea0b29d6e2d194e652fa7b2f3929c1068d

    • C:\Windows\PCGWIN32.LI4

      Filesize

      528B

      MD5

      b0b8ac6daee22cc80c239af6edb5de1c

      SHA1

      f4f2ba91a56399c4f79e4835270166723c107773

      SHA256

      d44b5d3425d3633ca800f99b3404d7724df7a8895f408e4597b466a6dea5e3f0

      SHA512

      6e31182b221cfeabb4af161230c218dba2f1a5935e4459688ab29665f651a8b1dae65216b7408471752f191bc57d75fb15e48ca0d68212ca356a592e88ba04ee

    • C:\Windows\server.exe

      Filesize

      253KB

      MD5

      f6b09f164d9dff2942d2977e10f0f121

      SHA1

      c7c78e6a15faeb4fc81dce878d629b3ccc0ca811

      SHA256

      f3a6e5010278054ba42e8c388598096c3d6528cd3550c60b2687c2e4bf0522c3

      SHA512

      45bc7dd718f4b1bbe2df3e6616b156eb661a40dfa34335a46f1f7f1cb396e9cb51a4970baa9c46387f02518fd5464168b9cb930bf6d2c67e186b79b620455f27

    • memory/2360-15-0x0000000003390000-0x00000000033A0000-memory.dmp

      Filesize

      64KB

    • memory/2360-17-0x00000000033D0000-0x0000000003417000-memory.dmp

      Filesize

      284KB

    • memory/2360-13-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/2360-0-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/2360-1-0x000000000040F000-0x0000000000447000-memory.dmp

      Filesize

      224KB

    • memory/2360-34-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/2360-35-0x000000000040F000-0x0000000000447000-memory.dmp

      Filesize

      224KB

    • memory/2416-32-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/2416-31-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/2416-33-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/2416-37-0x0000000010410000-0x0000000010449000-memory.dmp

      Filesize

      228KB

    • memory/2416-44-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB