Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 18:05

General

  • Target

    8ccbb61fc64817ecb98fef73dbd83a85_JaffaCakes118.exe

  • Size

    864KB

  • MD5

    8ccbb61fc64817ecb98fef73dbd83a85

  • SHA1

    3211b6bb82d795322aa76d54e4269cfa22f3c58c

  • SHA256

    cf19534b8e344a5e4d02947caa6f0d563ead18da7b51368c52038ff37e15c04f

  • SHA512

    67d5e7a451674bac85d761f67b9529c0941f0619942fc470bfbeaf136ceae818e73d71a8b4bca8c719d3c9a3bcf35d41725c5bd8780d90621fad9a7b0b4b71a1

  • SSDEEP

    12288:hl+EwN8dwnLb3wpnkSS3Ogn1Y5UHB4WNAlAqZ1ODbdDsrGp7FdRGvO8DVOtd:hl+Ew2pniFY5UhqrZ6bdDsUZdR4D2

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ccbb61fc64817ecb98fef73dbd83a85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ccbb61fc64817ecb98fef73dbd83a85_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2222222.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2222222.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
          PID:2268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 372
          3⤵
          • Program crash
          PID:1248
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CAMFRO~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CAMFRO~1.EXE
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\2222222.exe

      Filesize

      683KB

      MD5

      08521b4a7057cef60d8281f50a7bdc58

      SHA1

      2543185e7052bf667bda9886bca838c8a3374a3e

      SHA256

      d3e8b9e99e2e1c7580d0664798cac729328e8cea50aba3dd64aa8ce3a8cb451e

      SHA512

      50e86cc8f508ee91574efff05f8fd03e71e608d264da642e2cde5c700b90231b314208f0e6ffe706d59d9ddb7aa15feeb04d8e28f11ac7efb65f3eaea72182a9

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\CAMFRO~1.EXE

      Filesize

      158KB

      MD5

      3aef5ca939b245a2562fa564ef3b4324

      SHA1

      022a599433e335082be4d7c8853d2be85356c8f6

      SHA256

      b748ebdf06ef75f2baca63ceff4aa638a5eeb69a1dfe0a25d6466d36394ae91c

      SHA512

      d4cc80a0dc02d13686d836ca55d38a021b7773e465a7c6e63b1ae1c620b4cd2913694b7dabc84d8fcc45db607929913e5685205049bf59ba7043c10186941e01

    • \Windows\SysWOW64\BASSMOD.dll

      Filesize

      9KB

      MD5

      8d56adca34e7fb2dfacfc5ea87b23ff9

      SHA1

      0e93ae841d7a1f9587655906847ddcfc3269d9d1

      SHA256

      01742d6f3acdbaa65d5bfaaa62f97414d0c9a295305a526d089b34a06b6099b7

      SHA512

      96ceab8b750dae2a8e42bc353c1dfb5c43b879675e0f7e70d34467deebc2f9833269d38a6dadd621c76cadd465aa59fba0535c88a79a9ad8ea092caca04e78ab

    • memory/2752-38-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB

    • memory/2752-34-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB

    • memory/3008-22-0x000000000051F000-0x0000000000520000-memory.dmp

      Filesize

      4KB

    • memory/3008-18-0x0000000000400000-0x000000000056F000-memory.dmp

      Filesize

      1.4MB

    • memory/3008-21-0x0000000000400000-0x000000000056F000-memory.dmp

      Filesize

      1.4MB

    • memory/3008-24-0x0000000000400000-0x000000000056F000-memory.dmp

      Filesize

      1.4MB

    • memory/3008-17-0x000000000051F000-0x0000000000520000-memory.dmp

      Filesize

      4KB

    • memory/3008-16-0x0000000000400000-0x000000000056F000-memory.dmp

      Filesize

      1.4MB

    • memory/3012-20-0x0000000001001000-0x0000000001002000-memory.dmp

      Filesize

      4KB

    • memory/3012-0-0x0000000001001000-0x0000000001002000-memory.dmp

      Filesize

      4KB

    • memory/3012-11-0x0000000000E60000-0x0000000000FCF000-memory.dmp

      Filesize

      1.4MB

    • memory/3012-12-0x0000000000E60000-0x0000000000FCF000-memory.dmp

      Filesize

      1.4MB