Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2024, 07:51

General

  • Target

    afdac0d54ea19f5ecfad6ff8f58c8be3_JaffaCakes118.exe

  • Size

    39KB

  • MD5

    afdac0d54ea19f5ecfad6ff8f58c8be3

  • SHA1

    db3db9cf3c1a7c63921f35b3160380c07b79d60f

  • SHA256

    dacf2e2223972a4e1fdda685c97852c7c7edce09829ed7a2bef2d16a137fafc7

  • SHA512

    b0e2e52e91ec06026b1153235715624a2228fdb928293746e66b34c7472333d9a5741cb6fb72f741a38633db54276f028581931ddaf45a8ed3ec4150729b8738

  • SSDEEP

    384:Dh+ydlyiPgPSw9a8fiFubOv9cSUIDqum2aOsDbJuf9oPej++SFArhKWH9ecOmr7p:Dsfg8Kau5m7OsDbkoPk+tzWHUJYlmo

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\afdac0d54ea19f5ecfad6ff8f58c8be3_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\afdac0d54ea19f5ecfad6ff8f58c8be3_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Users\Admin\AppData\Local\Temp\afdac0d54ea19f5ecfad6ff8f58c8be3_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\afdac0d54ea19f5ecfad6ff8f58c8be3_JaffaCakes118.exe
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1236-10-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/1236-16-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

      Filesize

      24KB

    • memory/1508-4-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/2312-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2312-3-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2312-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2312-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2312-9-0x0000000000020000-0x0000000000031000-memory.dmp

      Filesize

      68KB

    • memory/2312-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2312-7-0x0000000000020000-0x0000000000031000-memory.dmp

      Filesize

      68KB

    • memory/2312-28-0x0000000000020000-0x0000000000031000-memory.dmp

      Filesize

      68KB