Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 06:27

General

  • Target

    fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe

  • Size

    436KB

  • MD5

    fdf6f116239d9f855afe6d8ff327400f

  • SHA1

    4ae6196ba17fbbebf945e40ca07982cf426a8760

  • SHA256

    d73f6fea533ee3d9fc1340d1f76251c564f86172c4128eeadcb648970ad88e7f

  • SHA512

    b9d5826cb5716c8b03ece877c291a0128fba4a8beb4ed1611e506b7317008ba5aa060fa0d4ba846e9b7251478af84c35137ab0ad04cf508ec05817e3daa84b16

  • SSDEEP

    6144:uFbVBjYNoo/Bwo0vEH0NMcFXO5zxg/b4sjPJpbGoSLcWKYkjIjkBgp1bzYPgTSzP:uFTzo0vEUNMcFXOM5KL+NjIIBgjk4TSj

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fdf6f116239d9f855afe6d8ff327400f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SysWOW64\EXPLOER.EXE
      C:\Windows\system32\EXPLOER.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2316
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\ReDelBat.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ReDelBat.bat

    Filesize

    212B

    MD5

    7317f188701802e680aa19337a7c05a7

    SHA1

    a6bacdee671575d0391a905a874cb1d2679ae116

    SHA256

    986c9816b569c4f00b9338852191bcd7a50868ec7b250f0420fd97dcb0158be0

    SHA512

    4a073ad41d1a9608e2bbfc77af2d4aef14fe18b9b9250984ec75696369d819cf17b8857f442e8dc01570ee2b1862f418551f74077a373cf3b23b361ac0021e86

  • \Windows\SysWOW64\EXPLOER.EXE

    Filesize

    436KB

    MD5

    fdf6f116239d9f855afe6d8ff327400f

    SHA1

    4ae6196ba17fbbebf945e40ca07982cf426a8760

    SHA256

    d73f6fea533ee3d9fc1340d1f76251c564f86172c4128eeadcb648970ad88e7f

    SHA512

    b9d5826cb5716c8b03ece877c291a0128fba4a8beb4ed1611e506b7317008ba5aa060fa0d4ba846e9b7251478af84c35137ab0ad04cf508ec05817e3daa84b16

  • memory/2316-15-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2316-14-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB

  • memory/2316-26-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB

  • memory/2316-18-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2332-3-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2332-2-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2332-1-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB

  • memory/2332-0-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB

  • memory/2332-12-0x0000000002F90000-0x00000000030E5000-memory.dmp

    Filesize

    1.3MB

  • memory/2332-27-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB