Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2024, 09:43

General

  • Target

    a136b82bf3db257750487c8be4a7dbf9_JaffaCakes118.exe

  • Size

    417KB

  • MD5

    a136b82bf3db257750487c8be4a7dbf9

  • SHA1

    0a4e7bac600253240dfed41b221cc01ce3c2b492

  • SHA256

    ea3710248a8aaab3c7b9e78a84fb56633ac3a02a44eb0fb38787b78ec968f9df

  • SHA512

    6d6892a7599530b054d0837ab586255de4e34c2f3f1c9e50e772e791265ba28675e347175902383fd38c2b8f222b42814f1f8870e0118c21829a6557c3f2ede0

  • SSDEEP

    6144:iunQUoeeZZU8zhrA/Cnx7W0f8UZ+qapZipW7+Z4Bv/4ae2RBot2:/QxPU8uCx7Wm8vGpWY4n4F2wt2

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\a136b82bf3db257750487c8be4a7dbf9_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a136b82bf3db257750487c8be4a7dbf9_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2276

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      56KB

      MD5

      424e49724702c134ef3927a070a1ff40

      SHA1

      f44db7006f4ad52147f2a96fbf906a5d75feb12d

      SHA256

      c81bc568365324d317697fae78050fd011b0f53b2cf25f0b213ba71d3a7ea7bd

      SHA512

      618b0738572f958dad59a6e35885130c1b67f4d339c73ff93f8105f8a1d87f734eab5e1d2a62732a9c0de7c913d9a88a0b054506f9d0c863207cbaac1c02ae1c

    • memory/2276-9-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2276-11-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2276-17-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2276-18-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/3216-10-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3528-13-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3528-14-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB