Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 17:09

General

  • Target

    026841cdf2743ebf03fd8b58633475e9_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    026841cdf2743ebf03fd8b58633475e9

  • SHA1

    d1d0070ab8096d7fdff0b7d472790768bcfa3fb6

  • SHA256

    f8d12a2d11c883c8907f5921b5a9b8c76caf5cf43c129e0bbf2ed3f54f3a4074

  • SHA512

    affd26d2167627d3958ff9a7ce11dee258b88f43dddf56beab726a1f8b324b15cffa1f89eada460ae29f03242187eab3d205e963642f3193a4bd5e13ef08607e

  • SSDEEP

    12288:QJRf/kk5yUBV8cIjWmEZHSNjqhSjb/xKJuUeBeXeJay/ltKSaYdL7OQJ6YU:QJZPDV8OZYn/xKJu2eJaS3d5J6YU

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\026841cdf2743ebf03fd8b58633475e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\026841cdf2743ebf03fd8b58633475e9_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2008_S~2.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2008_S~2.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:348
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
          PID:2596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2008_S~2.EXE

      Filesize

      285KB

      MD5

      98ce0872db276756c77cda1ab5c7f36b

      SHA1

      0c67d8de5472282ed209ce467ca06d37d31aeaa1

      SHA256

      cbe05647cf1e10a15d7ea10bb23e3784a7c09d3345c03f109e70b4d7dd05c0f9

      SHA512

      82770475999dd06cc0d3d1741cf162df493acdfd7ab4d9a1d10bc464c2dd569a2edebbd470f20ea26e1b85d6e2d4bb09f366f290129ac30fc240c2a7f7f2256d

    • memory/348-6-0x0000000000400000-0x000000000050A000-memory.dmp

      Filesize

      1.0MB

    • memory/348-8-0x0000000000400000-0x000000000050A000-memory.dmp

      Filesize

      1.0MB

    • memory/3944-0-0x0000000001000000-0x0000000001101000-memory.dmp

      Filesize

      1.0MB

    • memory/3944-10-0x0000000001000000-0x0000000001101000-memory.dmp

      Filesize

      1.0MB