Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2024, 10:14

General

  • Target

    9402e6b26bd7f0b29be54c735dc66d0c_JaffaCakes118.exe

  • Size

    271KB

  • MD5

    9402e6b26bd7f0b29be54c735dc66d0c

  • SHA1

    736576829b40ae7f95681245777cb0cdec595b5a

  • SHA256

    e22ff3e3b2e4b537eb3b5cdf9adf5e5c5278a630d8b90e6036260afe75d7bb65

  • SHA512

    25218e7a5cc2ee16255f265fc826703c3ecde702ddd6c16dced5f12f2b83de5e366e289594ffd449a8ecb4cf51b65ce947bf2ce0d21b35118215ab4fb9389afd

  • SSDEEP

    6144:TG377xS2Vp2Vp35A4nwTBAW753opcCJJvHo:ir7xS2Vpm3mswTaRbJJvHo

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9402e6b26bd7f0b29be54c735dc66d0c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9402e6b26bd7f0b29be54c735dc66d0c_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:3756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cmsetac.dll

    Filesize

    33KB

    MD5

    91a1d4be705e452c84dc3c802687083d

    SHA1

    fe7d5a7f185b16e579bc794e5f7851813de78bdb

    SHA256

    fe880cd4d597a3b3de64a85cfc6035230f98c347cf3afc36a6e4c3f9fd19f99f

    SHA512

    18b212de8e5b06a93be3177e8e2c7b32b6f62da94759345451d00c942b089b7d379b7facce62844a00a56e97ae7fd9b7dd88b84e69a4fa668710bf271cd5f76a

  • C:\Users\Admin\AppData\Local\Temp\ntdtcstp.dll

    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/3756-0-0x00000000008D0000-0x00000000008D1000-memory.dmp

    Filesize

    4KB

  • memory/3756-12-0x0000000004690000-0x0000000004691000-memory.dmp

    Filesize

    4KB

  • memory/3756-13-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/3756-14-0x0000000004650000-0x0000000004658000-memory.dmp

    Filesize

    32KB