Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 19:50

General

  • Target

    bef5ca3d1679bd2f3a12cfcb91fc2cee_JaffaCakes118.exe

  • Size

    661KB

  • MD5

    bef5ca3d1679bd2f3a12cfcb91fc2cee

  • SHA1

    2af9d2b506a88945d0a1103640b3129115cc7f31

  • SHA256

    d20dc7aa9449c65e158c71004661f0e81ede9c9eb03185857ec42f12cb98d2ee

  • SHA512

    e93338a13d56da14cdb3cdc2770bf86e93d6b3474a2098ac1831e4b5e9b5cff00a1e757a658d8efb65d4423c4cac77eb0f1949ef8301beb8704657d9d9001b78

  • SSDEEP

    12288:hyZUlSwlx+iR1aDrdhAzWeMj/43zldkm0CJwZRC8Wr9o9:hyZUlSwlx+i3QdhAzWeMj/izlSIJsPWg

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modiloader family
  • ModiLoader Second Stage 17 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bef5ca3d1679bd2f3a12cfcb91fc2cee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bef5ca3d1679bd2f3a12cfcb91fc2cee_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c copy "C:\Users\Admin\AppData\Local\Temp\bef5ca3d1679bd2f3a12cfcb91fc2cee_JaffaCakes118.exe" "C:\Windows\smss.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:532
    • C:\Windows\smss.exe
      "C:\Windows\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Drops file in Drivers directory
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Zreload.scr

    Filesize

    17KB

    MD5

    130d3d0a63c7f8f1fddea6bc57229a35

    SHA1

    3221c3c62683bad6b3512176b074ea11f0ee2a8f

    SHA256

    ae19d9190246e5bac39e13decd0fefd96cf352dc1c3351d0cc5838af903f1c05

    SHA512

    3812958a1a774706ead7d2223637c6d9cf3ab721baa6b344ba84e4bc2abcc0c8f84792a3a298a7565075037b5aae8885c852f7ee7e0e6426229b719addb264e9

  • C:\Windows\SysWOW64\drivers\slogs.sys

    Filesize

    41KB

    MD5

    9f323dec66a6befaa3027db0b4b40fe4

    SHA1

    e6816be88dc3847b76f1b6a94ffc35e77bf83e7f

    SHA256

    492fa13d360959144123c320914231a8427532a9fa8f82521b3e3e0cd242db8b

    SHA512

    fe51850b658058d3368eff906c9c988b81270fded0fc63a89ee4869ba0393d7cec7d468ac1554cf076ea62b9886e005f462bb2e2819adfa476e6beb88e94d2ea

  • C:\Windows\smss.exe

    Filesize

    661KB

    MD5

    bef5ca3d1679bd2f3a12cfcb91fc2cee

    SHA1

    2af9d2b506a88945d0a1103640b3129115cc7f31

    SHA256

    d20dc7aa9449c65e158c71004661f0e81ede9c9eb03185857ec42f12cb98d2ee

    SHA512

    e93338a13d56da14cdb3cdc2770bf86e93d6b3474a2098ac1831e4b5e9b5cff00a1e757a658d8efb65d4423c4cac77eb0f1949ef8301beb8704657d9d9001b78

  • memory/384-1-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/384-0-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/384-9-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-33-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-70-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-7-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/5028-31-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-34-0x00000000023F0000-0x00000000023FF000-memory.dmp

    Filesize

    60KB

  • memory/5028-35-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/5028-6-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-46-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-58-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-22-0x00000000023F0000-0x00000000023FF000-memory.dmp

    Filesize

    60KB

  • memory/5028-82-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-94-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-106-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-118-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-130-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-142-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-153-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-166-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-178-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB

  • memory/5028-190-0x0000000013140000-0x00000000131EB400-memory.dmp

    Filesize

    685KB