Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 23:52

General

  • Target

    8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe

  • Size

    195KB

  • MD5

    8e1fcf2e2303870540176fad91c66b85

  • SHA1

    2fabd935e7a1afef8c4fc2f24c5ee31ae30bd330

  • SHA256

    09a94c80d7d0d5bcefdac4197ddf9d50d512ca5398bd5343459c04a4b8fe4bc2

  • SHA512

    2895f357c53f00c8e2281ea7333fbc08ca49a832eaea244626a3d153e2a3e33cfade9e0a4f8ab4a86df3b8c0b3aa9841e8fdca09157ba9d0e616f48b2dcb0add

  • SSDEEP

    3072:vsG6C5Juicvr8JTdsaE+6ORrBC6p5PpSr+OaO5IbuIc3AhaXh56sCcr9ASB7ao+a:vsGCvrMsa6UCsviAO5rY4WNcr9ASIVQJ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 16 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\Msn Hack By C0dER x.exe
      "C:\Windows\Msn Hack By C0dER x.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe" \melt "C:\Windows\Msn Hack By C0dER x.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2736
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Msn Hack By C0dER x.exe

    Filesize

    189KB

    MD5

    c2bd1dbec773b693ff3a3138012a83db

    SHA1

    076777cf51f4907ee53d82b2e55737dbe0d764dc

    SHA256

    e88a91820b386e88f623e7f1b7708e1240034adff7eeb25f98af53400c87ee9b

    SHA512

    58b8d44b29619b64c284804f6f0dc73dac803ff4306ef4ebab1054a7266e5fa0a70e92b2b6affaa28ecb73465c19b43086082ba4b5ae226a9588a3e286085e31

  • C:\Windows\cmsetac.dll

    Filesize

    33KB

    MD5

    73789351c92759f02783bd7b64bef4b7

    SHA1

    c355d87e64f6d560e9d5b12dc9f51e9e764f7eb2

    SHA256

    f53c38bad50f10e298bc1b2979504877418b4075ca072c2762df9b605476345b

    SHA512

    2ca156a0167d1e1acb45ac2ffe57d3496233751b9c9dc73ee4d030909802e9018be07dd8a341e7c88c17cc3c3930f78794919ed0f0855040cd7ba5f45c26a18e

  • memory/2720-34-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2720-10-0x00000000035A0000-0x0000000003617000-memory.dmp

    Filesize

    476KB

  • memory/2720-9-0x00000000034A0000-0x0000000003517000-memory.dmp

    Filesize

    476KB

  • memory/2720-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2720-29-0x0000000002580000-0x0000000002582000-memory.dmp

    Filesize

    8KB

  • memory/2724-17-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/2724-24-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-39-0x0000000000340000-0x0000000000348000-memory.dmp

    Filesize

    32KB

  • memory/2736-48-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-78-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-75-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-72-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-25-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-40-0x00000000004D0000-0x00000000004DE000-memory.dmp

    Filesize

    56KB

  • memory/2736-38-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-41-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-42-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-45-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-32-0x00000000004D0000-0x00000000004DE000-memory.dmp

    Filesize

    56KB

  • memory/2736-51-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-54-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-57-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-60-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-63-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-66-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2736-69-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/3028-37-0x00000000004B0000-0x00000000004BE000-memory.dmp

    Filesize

    56KB

  • memory/3028-30-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/3028-36-0x00000000004B0000-0x00000000004BE000-memory.dmp

    Filesize

    56KB