Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2024 14:39

General

  • Target

    8bfb2bb98a1688892398e83c001047a0_JaffaCakes118.exe

  • Size

    642KB

  • MD5

    8bfb2bb98a1688892398e83c001047a0

  • SHA1

    2d6439dabfaa1d66731a1839c931f2964c63def9

  • SHA256

    024e0e516b1113bfccdb6716c19cba1ffb87a14410c44eef6f5b66fd42124a71

  • SHA512

    c2ba1d855342ea0c320965e6e3bc1e160d542f4f63776d99fec56cbccad81ddd90d64f35f2271ed354aa5773824543f3e311d5a34dc6881643509c4849fa7def

  • SSDEEP

    12288:ZvYnBSkuVUeZdYGwT10Q3L47gFhd8fzKXThxvDRth1HB6c:ZcSkuiGwTKYLogM23LHcc

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 17 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bfb2bb98a1688892398e83c001047a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8bfb2bb98a1688892398e83c001047a0_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\LOADER.EXE
      "C:\LOADER.EXE"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Windows\msnmsgr.exe
        "C:\Windows\msnmsgr.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:3764
    • C:\LOADER1.EXE
      "C:\LOADER1.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3076
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LOADER.EXE

    Filesize

    270KB

    MD5

    c9000eda33f7e8c22343e23c4bd958e7

    SHA1

    47f3c3dde5102c1aec509ea196da1269c1b38cd0

    SHA256

    adbaf1b266a3ab4f2ab477d87c5abe79c1a5c76e618482bbd56aa481496f60aa

    SHA512

    2167a62f1bf86f0cce82a01c970fbddab24f6ec2c0d72f094ba3c93ce8bd61e6f974cb4a8a1885e57bb659edcaea193adb32c7f94e0d3782cbee2802e8e82c7a

  • C:\LOADER1.EXE

    Filesize

    362KB

    MD5

    13305082605949d491d5aca4c85b4bc2

    SHA1

    46f43f090a5127a24f9c84833964e24b3a6dfa96

    SHA256

    572f4654931bbe77c45a3fff1cdefc62386ffc7fa41343755cba58aa364b83c9

    SHA512

    a84919608b3f6f979b102a37d32c3440f1260b62225fac7932444831d91dba6aea9fd3c7126a9dc83f1a2b58e599525040f52f83e4644a174c51c96acca92c47

  • C:\Windows\cmsetac.dll

    Filesize

    32KB

    MD5

    667bd6bb0abf879c9aee751e67f13101

    SHA1

    f1e8bacb0dcd18089e5db4bc30f0ec05a03383de

    SHA256

    0ce18b6ec174252a66955e97360fd2214158a7b575b0e3dc1a10e1b6d038c595

    SHA512

    e407a9373559331d99554a9f60652a0d960d469425d0afa4cfa27c8d1b394de83a2b97af54dee5d5a730e5d6bd0e82603595a15d0bda3b03385dd6e12ecec643

  • C:\Windows\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/3076-60-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/3076-19-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/3076-61-0x0000000002350000-0x000000000235E000-memory.dmp

    Filesize

    56KB

  • memory/3076-49-0x0000000002350000-0x000000000235E000-memory.dmp

    Filesize

    56KB

  • memory/3620-21-0x0000000002070000-0x0000000002071000-memory.dmp

    Filesize

    4KB

  • memory/3620-31-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-64-0x0000000002A10000-0x0000000002A1E000-memory.dmp

    Filesize

    56KB

  • memory/3764-83-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-62-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-63-0x0000000002250000-0x0000000002258000-memory.dmp

    Filesize

    32KB

  • memory/3764-115-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-66-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-70-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-74-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-78-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-43-0x0000000002A10000-0x0000000002A1E000-memory.dmp

    Filesize

    56KB

  • memory/3764-87-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-91-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-95-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-99-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-103-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-107-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3764-111-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/4768-20-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB