Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 03:17

General

  • Target

    924059ccbaea0e43561f2761bd035825_JaffaCakes118.exe

  • Size

    868KB

  • MD5

    924059ccbaea0e43561f2761bd035825

  • SHA1

    57297e61762c5a144639f34fe3691fb316b49a57

  • SHA256

    ce7e208280dbc88185d60d80f4bcc5c04e33086e5e3dcf8337445ddb90b9ffc3

  • SHA512

    ad5c579a7e66ff9069b1e286f03dca50156f34907791a1947a46d885508991466c1c1b95a17559f427c408b668052ca63493b937159f5487c7eeea83bcd6287e

  • SSDEEP

    12288:/byBPqujZRt6Iqw3mkWrVkHKJ3ED9uakrckc6GDiuKVg3Y6D/nJEh6:WBiuj8IerVkHK3ED9uakrckfG/nOh6

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\924059ccbaea0e43561f2761bd035825_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\924059ccbaea0e43561f2761bd035825_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AutoRun.inf

    Filesize

    175B

    MD5

    7883b1af9ea9216c4f9846b2cc8e1250

    SHA1

    d2e4b33106b59200948afb39b65adb8a08c9fa7f

    SHA256

    0bb5f1e59695a0c76d5471ec9b0427c9316cf9df9273eda8f33d3b2f6827af26

    SHA512

    f36492d4645e287dfb488d30e13f85119944444032d1361ae4d33ebc0db75c7fe74c32935518f5fd243c1d7f4791128e7ddc98affc686bf82140bfd9d0342b6d

  • memory/2380-1-0x000000000058C000-0x000000000058E000-memory.dmp

    Filesize

    8KB

  • memory/2380-0-0x0000000000400000-0x0000000000625CC4-memory.dmp

    Filesize

    2.1MB

  • memory/2380-21-0x0000000000400000-0x0000000000625CC4-memory.dmp

    Filesize

    2.1MB