Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2024, 21:29

General

  • Target

    b53e0918df4e5dc9a6a67a19544eaa7b_JaffaCakes118.exe

  • Size

    628KB

  • MD5

    b53e0918df4e5dc9a6a67a19544eaa7b

  • SHA1

    4fb083b6b8a136a223603ee035d4e15c14b8f7e3

  • SHA256

    c173c0c9604f5e9e3328c30b2ccf721516928bebff228524b7dc57c2054c2185

  • SHA512

    fc11c3654341ca562e15e87ec342ab872841d7154a4c7b499b0e04e2ad226022ef8c6279d7cfbe0fba4833035b09fc2a54ed88611795b50f01f55420a1ffd4fc

  • SSDEEP

    12288:/gd7RhWq3SXDnk38LFF7gwtF3Z4mxx+oEtlK+kt9T2MNm45:aoXD5F9vtQmX3Gah

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b53e0918df4e5dc9a6a67a19544eaa7b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b53e0918df4e5dc9a6a67a19544eaa7b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice91.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice91.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\system32\calc.exe"
        3⤵
          PID:2256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 300
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""
        2⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\ReDelBat.bat

      Filesize

      212B

      MD5

      244927cc3dbbdc809afe8d0f347c9b85

      SHA1

      4a2e289678823dd1eb56fcaaed3ca13c12b53d18

      SHA256

      203a766e989d2a596a2b58a254bf8b2a846e575758a9cc3d3d22dc65b7bb8325

      SHA512

      440c38a6d5f2541f564d1fce0b98c68d70f2632a83f99fc3909bc68e00a3c5eea6a2ac794bb205759eca2e0f4e22d50bfb183a59dd21a3c52fc478ae77986aa9

    • \Program Files\Common Files\Microsoft Shared\MSInfo\rejoice91.exe

      Filesize

      628KB

      MD5

      b53e0918df4e5dc9a6a67a19544eaa7b

      SHA1

      4fb083b6b8a136a223603ee035d4e15c14b8f7e3

      SHA256

      c173c0c9604f5e9e3328c30b2ccf721516928bebff228524b7dc57c2054c2185

      SHA512

      fc11c3654341ca562e15e87ec342ab872841d7154a4c7b499b0e04e2ad226022ef8c6279d7cfbe0fba4833035b09fc2a54ed88611795b50f01f55420a1ffd4fc

    • memory/2256-40-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/2256-37-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2796-63-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-61-0x0000000001E80000-0x0000000001ED4000-memory.dmp

      Filesize

      336KB

    • memory/2796-56-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/2796-32-0x0000000001E80000-0x0000000001ED4000-memory.dmp

      Filesize

      336KB

    • memory/3020-13-0x0000000003480000-0x0000000003481000-memory.dmp

      Filesize

      4KB

    • memory/3020-29-0x00000000046E0000-0x00000000047FA000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-12-0x0000000003380000-0x0000000003383000-memory.dmp

      Filesize

      12KB

    • memory/3020-11-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/3020-10-0x0000000000950000-0x0000000000951000-memory.dmp

      Filesize

      4KB

    • memory/3020-9-0x0000000001EE0000-0x0000000001EE1000-memory.dmp

      Filesize

      4KB

    • memory/3020-8-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

      Filesize

      4KB

    • memory/3020-7-0x0000000001EB0000-0x0000000001EB1000-memory.dmp

      Filesize

      4KB

    • memory/3020-6-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB

    • memory/3020-5-0x0000000000940000-0x0000000000941000-memory.dmp

      Filesize

      4KB

    • memory/3020-4-0x0000000001EC0000-0x0000000001EC1000-memory.dmp

      Filesize

      4KB

    • memory/3020-3-0x0000000000960000-0x0000000000961000-memory.dmp

      Filesize

      4KB

    • memory/3020-2-0x0000000000980000-0x0000000000981000-memory.dmp

      Filesize

      4KB

    • memory/3020-14-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/3020-30-0x00000000046E0000-0x00000000047FA000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-0-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-15-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/3020-34-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-16-0x00000000033C0000-0x00000000033C1000-memory.dmp

      Filesize

      4KB

    • memory/3020-17-0x00000000033B0000-0x00000000033B1000-memory.dmp

      Filesize

      4KB

    • memory/3020-45-0x0000000001F40000-0x0000000001F94000-memory.dmp

      Filesize

      336KB

    • memory/3020-46-0x00000000046E0000-0x00000000047FA000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-18-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/3020-54-0x0000000003400000-0x0000000003401000-memory.dmp

      Filesize

      4KB

    • memory/3020-19-0x0000000003410000-0x0000000003411000-memory.dmp

      Filesize

      4KB

    • memory/3020-55-0x00000000033F0000-0x00000000033F1000-memory.dmp

      Filesize

      4KB

    • memory/3020-59-0x0000000000400000-0x000000000051A000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-58-0x0000000001F40000-0x0000000001F94000-memory.dmp

      Filesize

      336KB

    • memory/3020-20-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/3020-1-0x0000000001F40000-0x0000000001F94000-memory.dmp

      Filesize

      336KB