Analysis

  • max time kernel
    94s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/11/2024, 02:59

General

  • Target

    aabb389281162ed1611def5e811edb7b_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    aabb389281162ed1611def5e811edb7b

  • SHA1

    82ce5b109256dd3f2a4a93a8809eee1d0e3f4b37

  • SHA256

    fc9d18edc206492955cd79ce1a3e9db2d319dfade4429b0ed1c5947eac65d885

  • SHA512

    e1ddb5654b0d816f04a9b37021a769fc7731844ca22f81e60c38b6db32e05d3f5c770f66f035d2d541b79ed9c5eed96a648e93d78f5380c60120185080ed4cb8

  • SSDEEP

    6144:kK9qeqLca1QumBZJPie8KrBoBfZ9HAtgziC:kOqeqn1QxJEZFAtgzX

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aabb389281162ed1611def5e811edb7b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\aabb389281162ed1611def5e811edb7b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\saleem.exe
      "C:\Users\Admin\AppData\Local\Temp\saleem.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\saleem.exe

    Filesize

    183KB

    MD5

    909980b0106a24e77239aecf7e8f08d0

    SHA1

    4019e8413fc757814cfa31e2025ad5aff78df9dc

    SHA256

    48ca2a4472027cf707a4c54c500539f5ed905e6c8ca63b871a250f8a52f727df

    SHA512

    91e43fcd9364f5e3905d9243d93ba42f5db48379167105b275d0f3f17867ffc3b63355413e3444ec354f509c469de1c0d730c961c1537826220752d4fd1765fe

  • memory/4164-13-0x00000000748F2000-0x00000000748F3000-memory.dmp

    Filesize

    4KB

  • memory/4164-14-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/4164-15-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/4164-16-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/4164-18-0x00000000748F0000-0x0000000074EA1000-memory.dmp

    Filesize

    5.7MB

  • memory/4300-11-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB