Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2024, 17:09

General

  • Target

    c38b6531d904c46ccd2a2a1cf9e80543_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    c38b6531d904c46ccd2a2a1cf9e80543

  • SHA1

    a7b8c818099d694ce4f3ed0be90fbe1a6eb8e564

  • SHA256

    dabd800fc600631531e376672bd68bbc64e05fecaa9d9c051bf0e1e4816a1eae

  • SHA512

    16df39b6d2ffc353b2e8a66a8bf45ae9373660fbd4a9a2c6f95c13230a64da0ddeef616798edcf5c6354cccf8ea86a3f62de175def36660c7c1839f4d42a865a

  • SSDEEP

    1536:5K8ddtt1FFxxVToOBz0WlZnbMLJhUUKJ3zzj1w:5K8dJDJDMLJh+ZzzB

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\c38b6531d904c46ccd2a2a1cf9e80543_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\c38b6531d904c46ccd2a2a1cf9e80543_JaffaCakes118.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Users\Admin\AppData\Local\Temp\sex tup yoop egfhhyjewkkksex..mp4jdjjgfffvcsexcvsrghejkeyysgsdff563d2d3s3s3sssssssss3s3333333sd2fdfredgkiieruieueuiiiukjkhjjhijugyugwggdffgfhjuhyueij.3pghdhgygdywegt.exe
          "C:\Users\Admin\AppData\Local\Temp\sex tup yoop egfhhyjewkkksex..mp4jdjjgfffvcsexcvsrghejkeyysgsdff563d2d3s3s3sssssssss3s3333333sd2fdfredgkiieruieueuiiiukjkhjjhijugyugwggdffgfhjuhyueij.3pghdhgygdywegt.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1116
          • C:\Users\Admin\AppData\Local\Temp\server.exe
            "C:\Users\Admin\AppData\Local\Temp\server.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      28KB

      MD5

      7ef4a9f4cffd05a1da4d543e4c19f43c

      SHA1

      54e7f8f2718a7475f16339c8c77bc975fac5b4c0

      SHA256

      88c753f12dcf7828b287a67dd343d26ab176a9cbe489096c2c429075069aaa3c

      SHA512

      ea50b2fe27e2343511be18414b5053ca94056b6dfe48b99a55e4be56218cdcb2e274df3d8a3c07a41eaa210bc35e292f4f0c2d466b24b657becb009bbbc7e06d

    • C:\Users\Admin\AppData\Local\Temp\sex tup yoop egfhhyjewkkksex..mp4jdjjgfffvcsexcvsrghejkeyysgsdff563d2d3s3s3sssssssss3s3333333sd2fdfredgkiieruieueuiiiukjkhjjhijugyugwggdffgfhjuhyueij.3pghdhgygdywegt.exe

      Filesize

      63KB

      MD5

      d512a69ee8bd7d9745d6809c31b5f936

      SHA1

      6a9eeadc3b184cc74bbd2a53de1a11a6993b43a6

      SHA256

      505de7dc0b7ceda2443b3a172000874a986b3923cdf15fc609bd13b8fb48442a

      SHA512

      31b813ea298e8d6456fba585bbd0b582f628fce5860919c4589097965c61daefaf6f983c66b3648ef63344a636bbdccf14d91ee544f8417d74ada6d813428f65

    • memory/784-17-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/784-20-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/784-28-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/784-27-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/1116-18-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/1520-7-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/3532-21-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/3532-23-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

      Filesize

      24KB