Analysis

  • max time kernel
    140s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 11:03

General

  • Target

    bd16eb42f0cf3976316b9fda814fbb6d_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    bd16eb42f0cf3976316b9fda814fbb6d

  • SHA1

    2bd58477f91b4b4ef1272c1b6a9332caaf23ea8b

  • SHA256

    b21fa21c9599c55f74168aaac46c401c6feabf2156a35b6678987b49e9ed25b6

  • SHA512

    b7e8109630011f837c22ff5b1110ce2e0cf753a353a836438abb2a2bfddb3c256da1fde005231d41dfd4c5a215d4abc7b25365c2f642f8de226545133156eb46

  • SSDEEP

    49152:bmjQb46xVU6YCwc//////w6SNVyTmvDQ4Xc//////XwJ2xvU:bmEbHU6Nwc//////w6S3RDjXc//////j

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd16eb42f0cf3976316b9fda814fbb6d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd16eb42f0cf3976316b9fda814fbb6d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Re2009.ini

    Filesize

    475B

    MD5

    3d789700820b287d288bbf0ba1fed5fa

    SHA1

    5aeed2783cf4adaa261d58b54680df04683e6a1a

    SHA256

    88b13dcb7cf3d1db49b81309cd1fe34e26530b65faa0801579cad2ed450e93c8

    SHA512

    7318f25066adcae4ec90959f4fcf3c392a3cfdd15a0db1f65ad50f4256b0dded3969b95eea3a079c1ebbb28180f4b353ecf804ec006175be0afc40933fd69f50

  • memory/3144-0-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/3144-24-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

    Filesize

    4KB

  • memory/3144-33-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/3144-34-0x0000000000400000-0x0000000000682000-memory.dmp

    Filesize

    2.5MB

  • memory/3144-35-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

    Filesize

    4KB