Analysis

  • max time kernel
    141s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 05:05

General

  • Target

    f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    f7a097ec7811f82c11296085e9cd539d

  • SHA1

    b40d0447a9d5ba906d56551b78311f2c39ec9838

  • SHA256

    22b66c1abab1e0f7a30db72426404815300c715bc1bc49f3d0b1edb4b4cb3e27

  • SHA512

    a9373f0239b42b061b8784018893824531ca44cb8f1098c1b7043253ad659fc2acade29066edbcc2a2181e2db1e1f209d958139fb1b0dacf60fd1afedd93f83a

  • SSDEEP

    49152:aSwf/YI9og/xeRK9jj18c8GuwhkRIjx1apgubKe3:aS0Q2o+xkK5j1lSwhkix1DQR

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3424
      • C:\Users\Admin\AppData\Local\Temp\f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f7a097ec7811f82c11296085e9cd539d_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Users\Admin\AppData\Local\Temp\win.exe
          "C:\Users\Admin\AppData\Local\Temp\win.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Users\Admin\AppData\Local\Temp\win.exe
            R
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1436
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Exclusive Girls beautiful show ass Get Fucked(1).scr.mpg"
          3⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:4776
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x520 0x528
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4520

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Exclusive Girls beautiful show ass Get Fucked(1).scr.mpg

      Filesize

      1.8MB

      MD5

      bb4bac0f1b7a2babc942346fef8a097a

      SHA1

      883f7aa12ce70671b15b6a9d687c05228b85b605

      SHA256

      c8f9ae95042b57e8a42dbf9037563db42a2c3e4a571d0178c0deb27ccdaaf5a2

      SHA512

      bf037b13ac8d416a0b09443903934c1625b6b7e788c2010ce369d2d8e9659b3d424e39ea56a8d0ff8e883e379e7d7b58813cf637e9b0bc2bdb10e898c3627fe2

    • C:\Users\Admin\AppData\Local\Temp\win.exe

      Filesize

      82KB

      MD5

      70d8b66d2dc979835ec43fb0afe8fee4

      SHA1

      a5c047bd5af8c4660227ab21a535dd6fdbc6f332

      SHA256

      e3cb606532867110847f0b992b5731b75cc3c8be153293a818c2996de33cc7ed

      SHA512

      e18c856da156caad49c3cabaf49e486c0973780ecbf90597f4e786d9c8eead653f4bf67fdd747545eba2b99fbc9cc81fe59a32ef5ba9553f6d063e2085cd5d33

    • memory/1436-30-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1436-25-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1436-29-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1436-26-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3424-35-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

      Filesize

      24KB

    • memory/3424-33-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/4428-31-0x0000000000400000-0x00000000004151F0-memory.dmp

      Filesize

      84KB

    • memory/4776-50-0x00007FFFEF570000-0x00007FFFEF581000-memory.dmp

      Filesize

      68KB

    • memory/4776-55-0x00007FFFEED40000-0x00007FFFEED58000-memory.dmp

      Filesize

      96KB

    • memory/4776-70-0x00007FFFDE7F0000-0x00007FFFDF8A0000-memory.dmp

      Filesize

      16.7MB

    • memory/4776-61-0x00007FFFEE0D0000-0x00007FFFEE386000-memory.dmp

      Filesize

      2.7MB

    • memory/4776-52-0x00007FFFDE7F0000-0x00007FFFDF8A0000-memory.dmp

      Filesize

      16.7MB

    • memory/4776-42-0x00007FFFF2590000-0x00007FFFF25C4000-memory.dmp

      Filesize

      208KB

    • memory/4776-41-0x00007FF6EFBA0000-0x00007FF6EFC98000-memory.dmp

      Filesize

      992KB

    • memory/4776-53-0x00007FFFEED60000-0x00007FFFEEDA1000-memory.dmp

      Filesize

      260KB

    • memory/4776-43-0x00007FFFEE0D0000-0x00007FFFEE386000-memory.dmp

      Filesize

      2.7MB

    • memory/4776-49-0x00007FFFF00F0000-0x00007FFFF010D000-memory.dmp

      Filesize

      116KB

    • memory/4776-51-0x00007FFFDF8A0000-0x00007FFFDFAAB000-memory.dmp

      Filesize

      2.0MB

    • memory/4776-48-0x00007FFFF2350000-0x00007FFFF2361000-memory.dmp

      Filesize

      68KB

    • memory/4776-47-0x00007FFFF2520000-0x00007FFFF2537000-memory.dmp

      Filesize

      92KB

    • memory/4776-46-0x00007FFFF2540000-0x00007FFFF2551000-memory.dmp

      Filesize

      68KB

    • memory/4776-45-0x00007FFFF26E0000-0x00007FFFF26F7000-memory.dmp

      Filesize

      92KB

    • memory/4776-44-0x00007FFFF46C0000-0x00007FFFF46D8000-memory.dmp

      Filesize

      96KB

    • memory/4776-58-0x00007FFFEECE0000-0x00007FFFEECF1000-memory.dmp

      Filesize

      68KB

    • memory/4776-57-0x00007FFFEED00000-0x00007FFFEED11000-memory.dmp

      Filesize

      68KB

    • memory/4776-56-0x00007FFFEED20000-0x00007FFFEED31000-memory.dmp

      Filesize

      68KB

    • memory/4776-54-0x00007FFFEF540000-0x00007FFFEF561000-memory.dmp

      Filesize

      132KB

    • memory/5052-18-0x0000000000400000-0x00000000005EB000-memory.dmp

      Filesize

      1.9MB

    • memory/5052-11-0x0000000003690000-0x00000000036A0000-memory.dmp

      Filesize

      64KB

    • memory/5052-15-0x0000000003690000-0x00000000036A0000-memory.dmp

      Filesize

      64KB

    • memory/5052-14-0x0000000003690000-0x00000000036A0000-memory.dmp

      Filesize

      64KB

    • memory/5052-13-0x0000000003690000-0x00000000036A0000-memory.dmp

      Filesize

      64KB