Analysis

  • max time kernel
    145s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 00:51

General

  • Target

    91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe

  • Size

    890KB

  • MD5

    91a31aed2f492af595b5170ffeee760c

  • SHA1

    094b8c49418272737243bfc0380753c4adf177f8

  • SHA256

    0e3d6b0ac9cd4699c8c98929306b2679026e4add1cad2eb9ca4a542030e395e5

  • SHA512

    55a293dfe9dd768868ca0c0e3f2f8ec2bba9119f7372d3f8ca67e071d8149334713c37e4957347e118d01f9dea31b288d71252530897360c40d0caeba40ad841

  • SSDEEP

    24576:pwQOryEvO+LpFthUQQymLrs8w13VLospnN115qQtm:pljQphDNmLrPw3senN115qIm

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 21 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe
      2⤵
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2460
      • C:\Windows\ctfmon.exe
        "C:\Windows\ctfmon.exe" \melt "C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Windows\ctfmon.exe
          C:\Windows\ctfmon.exe
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • System policy modification
          PID:1064
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\ctfmon.exe

    Filesize

    890KB

    MD5

    91a31aed2f492af595b5170ffeee760c

    SHA1

    094b8c49418272737243bfc0380753c4adf177f8

    SHA256

    0e3d6b0ac9cd4699c8c98929306b2679026e4add1cad2eb9ca4a542030e395e5

    SHA512

    55a293dfe9dd768868ca0c0e3f2f8ec2bba9119f7372d3f8ca67e071d8149334713c37e4957347e118d01f9dea31b288d71252530897360c40d0caeba40ad841

  • \??\c:\users\admin\appdata\local\temp\DFD71EBB

    Filesize

    14B

    MD5

    faf41fe287d0c7c7f451c6caa86d66c6

    SHA1

    e374f4ed95915bf79837897243d16e28cf9e23a7

    SHA256

    045bd169830420c710d4d51d59414530ee6d178e5b0fbe11a40ed6dfae142bc1

    SHA512

    4ffb371ed75da223bc5dbcda167fd083cc09272b271dfae8ff38312c83d118b5c7e9ad21fb0ba2a7250207481403fd33a362c4ecb40b74d67cd64d4371c4c6d6

  • \Windows\SysWOW64\EtNDuISBB.dll

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • memory/1064-57-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-59-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-76-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-47-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-72-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-70-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-68-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-66-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-64-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-62-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-55-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-53-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-52-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/1064-45-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-78-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-74-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1064-51-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1480-39-0x0000000004270000-0x00000000043C3000-memory.dmp

    Filesize

    1.3MB

  • memory/1480-31-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/1480-46-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2072-7-0x0000000004210000-0x0000000004363000-memory.dmp

    Filesize

    1.3MB

  • memory/2072-0-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2072-14-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/2072-10-0x0000000004A50000-0x0000000004DF5000-memory.dmp

    Filesize

    3.6MB

  • memory/2460-11-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2460-26-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2460-50-0x0000000002D90000-0x0000000003135000-memory.dmp

    Filesize

    3.6MB

  • memory/2460-16-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2460-15-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2460-13-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2460-19-0x0000000001F30000-0x0000000001F40000-memory.dmp

    Filesize

    64KB

  • memory/2460-28-0x0000000002D90000-0x0000000003135000-memory.dmp

    Filesize

    3.6MB