Analysis

  • max time kernel
    94s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 09:52

General

  • Target

    f81a91dafdf1ba8212b508ad0e38baf6_JaffaCakes118.exe

  • Size

    319KB

  • MD5

    f81a91dafdf1ba8212b508ad0e38baf6

  • SHA1

    41bda1037df9142416de8a43cfc1e9af02a8d1fb

  • SHA256

    ab3b884636f0245a47dd659b4833d900226b6ae8cb2483266e63bb2453d61d84

  • SHA512

    d5b4af20855af8fc1a656f744a3d3dceb51b22703239bc9bfdc2e0689cfc541fd07488565857e19d6bba48672fe8fc8e56968f7828678ba8088e53ed0ac03b36

  • SSDEEP

    3072:u+8SuviVZPz8/2/MMtWsX58Xdr9HoZAiHtu89t74l+cmZyCBys7Q6qOkaH7k3G7i:aQguZWZogWnve

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f81a91dafdf1ba8212b508ad0e38baf6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f81a91dafdf1ba8212b508ad0e38baf6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\1123132.exe
      "C:\Users\Admin\AppData\Local\Temp\1123132.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\1123132.exe
        C:\Users\Admin\AppData\Local\Temp\1123132.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:3384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 12
          4⤵
          • Program crash
          PID:2396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3384 -ip 3384
    1⤵
      PID:1364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1123132.exe

      Filesize

      178KB

      MD5

      cefd27ace3ef5a3bdcd0e6ec427ba77f

      SHA1

      d5b48deb9f94e22550156c1c62b3cb5af884d3dd

      SHA256

      a3b9e0ab740fcf59469883ca42f47f9b80195f8ebb1feafdfa531a1443f43003

      SHA512

      b2305052e333d63633f4d0fcfb277f9f7586b5e6dbbed324a9226c1c1b9f06b8ef2f480431059e069d4ea40ed80433c5570bee82e9fc249339f702ece6cb96d9

    • memory/1328-12-0x00007FF816DD0000-0x00007FF816FC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1328-13-0x00007FF816DD0000-0x00007FF816FC5000-memory.dmp

      Filesize

      2.0MB

    • memory/4444-10-0x0000000000400000-0x0000000000457000-memory.dmp

      Filesize

      348KB