Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 02:36

General

  • Target

    ffc83b9aa40ca81984d78014463e2ba4_JaffaCakes118.exe

  • Size

    677KB

  • MD5

    ffc83b9aa40ca81984d78014463e2ba4

  • SHA1

    ad457f280a8dd6a665782a9692ca5b492dbc4bcd

  • SHA256

    3149e93ccfbc3d440aa0e7a1f2c0be66bb7b137fe89984081d55da7a7dd69747

  • SHA512

    a34024e78a5613df01a19875f3d17f8b1346e05b061fa62b7fb4c86a4b759d8b24dd84a5ccae4dac2f425242c4921e4820b74dfbddcaf84eba403fe799773abe

  • SSDEEP

    12288:ioEY/FkhU5xNrepgs4W/ThbgnqthmF3Z4mxxlV9c2KhGiOM:i1U5xNecAiWmQmXlVGHSM

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffc83b9aa40ca81984d78014463e2ba4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ffc83b9aa40ca81984d78014463e2ba4_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2008_S~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2008_S~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Program Files\Common Files\Microsoft Shared\MSINFO\Se47.exe
        "C:\Program Files\Common Files\Microsoft Shared\MSINFO\Se47.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\calc.exe
          "C:\Windows\system32\calc.exe"
          4⤵
            PID:2292
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 12
              5⤵
              • Program crash
              PID:2872
          • C:\program files\internet explorer\IEXPLORE.EXE
            "C:\program files\internet explorer\IEXPLORE.EXE"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2436
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:17410 /prefetch:2
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4188
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c erase /F C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2008_S~1.EXE
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4868
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2292 -ip 2292
      1⤵
        PID:1828

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        d08423737246250d0c3c50ea390cd1c4

        SHA1

        5b48dab1d90ac5357dafd6ad8b6990da92aaf75a

        SHA256

        7714ff60052145ab9a2bdd947fbbec0572c02389256b2db314f2670764862789

        SHA512

        67f5c7e7078f4fb5216b91b31e6b38c5497324413f8fc79cd662cad952a808453289b3ef2226fa377812bfc93697f11e5d6e064dc0e5f80b1a6b15dc516eb10e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        404B

        MD5

        7e6b485a8ca48034f7d3ee07736a1c3d

        SHA1

        550b9fd3ddae44d9b43119035dc8f3b62ffdd7b9

        SHA256

        04e6615596f519edf4e05335f3d0a09840c79966cb9e9b7f20d8565c22d5f97f

        SHA512

        1edd5d8f631170358caa08ba1046def6fcc975902393090a2128fca57a6aa4dca6a2bb057c8fed2fef9695248160a10527a26b8ffa0a5fd6e5983b65f2592aa1

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BRZNMQLE\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2008_S~1.EXE

        Filesize

        705KB

        MD5

        bb1cd30e18b46b095698d51c8c26ffd4

        SHA1

        d48c8a8eae2c78892b2335c795a15fa10a194b61

        SHA256

        7b491c9a5643d037487d0de9be877a1318e4af23433e0632da2cd20c713c2c69

        SHA512

        a9753192276ce84f7720dc1328079ce80653d8cce7e592f4a5c7a96ea58b0a0c38c773fe7d2548eb162210b8f7679d55974b61d6465a4d0ff59333c112119978

      • memory/2292-80-0x0000000000400000-0x00000000004BA000-memory.dmp

        Filesize

        744KB

      • memory/2436-82-0x0000000000E60000-0x0000000000F1A000-memory.dmp

        Filesize

        744KB

      • memory/2652-83-0x0000000000400000-0x00000000004B9016-memory.dmp

        Filesize

        740KB

      • memory/2660-47-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-3-0x0000000000670000-0x0000000000671000-memory.dmp

        Filesize

        4KB

      • memory/2660-6-0x0000000000640000-0x0000000000641000-memory.dmp

        Filesize

        4KB

      • memory/2660-5-0x0000000000650000-0x0000000000651000-memory.dmp

        Filesize

        4KB

      • memory/2660-4-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

        Filesize

        4KB

      • memory/2660-43-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-2-0x0000000000A80000-0x0000000000A81000-memory.dmp

        Filesize

        4KB

      • memory/2660-22-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-21-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-32-0x0000000000C60000-0x0000000000C61000-memory.dmp

        Filesize

        4KB

      • memory/2660-42-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-66-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-65-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-30-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

        Filesize

        4KB

      • memory/2660-64-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-63-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-62-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-61-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-60-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-59-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-58-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-57-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-56-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-55-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-54-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-53-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-52-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-51-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-50-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-44-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-48-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-8-0x0000000000A90000-0x0000000000A91000-memory.dmp

        Filesize

        4KB

      • memory/2660-46-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-45-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-49-0x0000000001000000-0x000000000110C000-memory.dmp

        Filesize

        1.0MB

      • memory/2660-7-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

        Filesize

        4KB

      • memory/2660-39-0x0000000000CB0000-0x0000000000CB1000-memory.dmp

        Filesize

        4KB

      • memory/2660-41-0x0000000000D00000-0x0000000000D01000-memory.dmp

        Filesize

        4KB

      • memory/2660-40-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

        Filesize

        4KB

      • memory/2660-38-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

        Filesize

        4KB

      • memory/2660-37-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

        Filesize

        4KB

      • memory/2660-36-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-35-0x0000000000C10000-0x0000000000C11000-memory.dmp

        Filesize

        4KB

      • memory/2660-34-0x0000000000C80000-0x0000000000C81000-memory.dmp

        Filesize

        4KB

      • memory/2660-33-0x0000000000C50000-0x0000000000C51000-memory.dmp

        Filesize

        4KB

      • memory/2660-31-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

        Filesize

        4KB

      • memory/2660-29-0x0000000000C70000-0x0000000000C71000-memory.dmp

        Filesize

        4KB

      • memory/2660-28-0x0000000000C20000-0x0000000000C21000-memory.dmp

        Filesize

        4KB

      • memory/2660-27-0x0000000000C40000-0x0000000000C41000-memory.dmp

        Filesize

        4KB

      • memory/2660-26-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-25-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-24-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-23-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-20-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-19-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-18-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-17-0x00000000030F0000-0x00000000030F1000-memory.dmp

        Filesize

        4KB

      • memory/2660-16-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-15-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-14-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-13-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-12-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-11-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

        Filesize

        4KB

      • memory/2660-10-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-74-0x0000000000680000-0x00000000006D4000-memory.dmp

        Filesize

        336KB

      • memory/2660-9-0x0000000003100000-0x0000000003101000-memory.dmp

        Filesize

        4KB

      • memory/2660-1-0x0000000000680000-0x00000000006D4000-memory.dmp

        Filesize

        336KB

      • memory/2660-0-0x0000000001000000-0x000000000110C000-memory.dmp

        Filesize

        1.0MB

      • memory/2660-86-0x0000000001000000-0x000000000110C000-memory.dmp

        Filesize

        1.0MB

      • memory/4848-84-0x0000000000400000-0x00000000004B9016-memory.dmp

        Filesize

        740KB