Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 04:32

General

  • Target

    9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    9292c01026392c900b72e4bc543ee4d1

  • SHA1

    76563158b9f884fad61632e8eb30b7063de4b467

  • SHA256

    d88d7e3bdaad0b97a1e7e139b464a5464ee28d5b70ebb055a4f5e12b18c6342c

  • SHA512

    bfe9047ae353f3f9696209897ab1b5d34d5faa1117cd50bddd144773fc13edd487add63a8f2d8c825fa2c0e846c8a4ff4c9616c6847d64b7cf978031966e0d5e

  • SSDEEP

    1536:N08QMDAozYeVWnJOz2Swc/KbCi7RTuEEfhxwzi3rIEzdnjuhbh:lDxWnJOz1GbCaTuEehxwzUrI6dnjuhbh

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9292c01026392c900b72e4bc543ee4d1_JaffaCakes118.exe
      2⤵
        PID:3692
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Users\Admin\AppData\Local\Temp\panmap.exe
          C:\Users\Admin\AppData\Local\Temp\\panmap.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3288
          • C:\Users\Admin\AppData\Local\Temp\panmap.exe
            C:\Users\Admin\AppData\Local\Temp\panmap.exe
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2852
            • C:\Users\Admin\AppData\Roaming\Adobeflash.exe
              "C:\Users\Admin\AppData\Roaming\Adobeflash.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1636
              • C:\Users\Admin\AppData\Roaming\Adobeflash.exe
                C:\Users\Admin\AppData\Roaming\Adobeflash.exe
                6⤵
                  PID:2940

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\panmap.exe

        Filesize

        84KB

        MD5

        9292c01026392c900b72e4bc543ee4d1

        SHA1

        76563158b9f884fad61632e8eb30b7063de4b467

        SHA256

        d88d7e3bdaad0b97a1e7e139b464a5464ee28d5b70ebb055a4f5e12b18c6342c

        SHA512

        bfe9047ae353f3f9696209897ab1b5d34d5faa1117cd50bddd144773fc13edd487add63a8f2d8c825fa2c0e846c8a4ff4c9616c6847d64b7cf978031966e0d5e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\CertPolEng.exe

        Filesize

        6KB

        MD5

        09050857004e30fc1235827a82aa849c

        SHA1

        8b656860644de40992999db81e48078882dbe3d9

        SHA256

        2bcea9ed1bcafdd3796cecf86ff868539ee278eb257c20617440aac9fa5eada9

        SHA512

        48221e78007ce8f5a423898fec15651cc1af309aac28a9140bfcf69d1de2051e77a77c39267c425e4bb7f33d8fe8e46b27e37f081f373c25c4967e0467006f9f

      • memory/2488-92-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/2488-18-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/2488-17-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/2488-20-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/2852-24-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/2852-26-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/2852-27-0x0000000000400000-0x0000000000411000-memory.dmp

        Filesize

        68KB

      • memory/3288-93-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/3288-23-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/3288-94-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/3288-29-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/3288-30-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/4552-0-0x0000000074992000-0x0000000074993000-memory.dmp

        Filesize

        4KB

      • memory/4552-90-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/4552-91-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/4552-1-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB

      • memory/4552-89-0x0000000074992000-0x0000000074993000-memory.dmp

        Filesize

        4KB

      • memory/4552-2-0x0000000074990000-0x0000000074F41000-memory.dmp

        Filesize

        5.7MB