Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 13:35

General

  • Target

    b8749ce0d0671422b32f0576d88848ed_JaffaCakes118.exe

  • Size

    37KB

  • MD5

    b8749ce0d0671422b32f0576d88848ed

  • SHA1

    002e675a6a0c097c17a2a648f0b8cb65eaac2d37

  • SHA256

    5a2e5f8f78bf2c6a3e8a9d9f0481da6456b00c02e8bb5d803ab81869b56bd54c

  • SHA512

    16213e58aee10b7f769091a40b08782eee2eed411260e21ee37c527c0ab992adf3c19971729e8a4792a99e1b0cc28020dce12a9dfae89239c0a1f5f59c259c61

  • SSDEEP

    768:i2hqVaXthyz8IxtonIJ4yY5rGfF3J1Rd/5va7OO/sedCKFRYwX4Kpj2:i2UV8tzIx+nIiywifhQ6O/s8F244Ai

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8749ce0d0671422b32f0576d88848ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b8749ce0d0671422b32f0576d88848ed_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\Common Files\Microsoft Shared\MSInfo\atmQQ2.dll

    Filesize

    20KB

    MD5

    3693853b301eb11ab88a8c51bd6683d4

    SHA1

    a999f9f02af19bdd7ab636c1832166a976395ccb

    SHA256

    a0e7124f0d218c81a5c5c1bcc78f06d5073b9dc17184cf0a9fe41b62b10ad80b

    SHA512

    57d94c23842c7d57147610461991f795e66a8e3c638e93ce589ebf848a49cd748b825e6e61a1fa5a1986faa16c92a0aafef161011fd0754ab2cb02b3f04193e6

  • memory/1304-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1304-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1304-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1304-3-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1304-7-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB

  • memory/1304-8-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB