Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 01:51

General

  • Target

    d01c1791496b85dc15c40e8ee442a49e_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    d01c1791496b85dc15c40e8ee442a49e

  • SHA1

    f68e7ea602d9618f8796f5b1c031f0db4de3376e

  • SHA256

    e0412214ce67433f44e4e5e62ea81b0672ad535e4ed91f8ee4c1a3d82a48d79e

  • SHA512

    2194d29fa256878e673290074ac6a3df98446abd306d98fef9020edc03e9f533032a02891ef612e0f2009a06cc3864dbeb42be4564f3ca3344479aee731ce207

  • SSDEEP

    49152:zqEM6l7Oh7rfoSP/n4Tr3cEpmXK8mHRMMMvMMM3:Gt6l7IYSnnCyK8mxMMMvMMM3

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d01c1791496b85dc15c40e8ee442a49e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d01c1791496b85dc15c40e8ee442a49e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Users\Admin\AppData\Local\Temp\2008_server.exe
      "C:\Users\Admin\AppData\Local\Temp\2008_server.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
          PID:2200
      • C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ.exe
        "C:\Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\2008_server.exe

      Filesize

      1.8MB

      MD5

      e6a041eee77e6e2edc02cd22263ad1ce

      SHA1

      0b3ecdb517afdd7a8f013f098930585e732384b6

      SHA256

      7b508803a3fd2d74002e5edb280ed22f70c56904f56bce9071a53919c76576bf

      SHA512

      62505f28766562623a092e66a91f2fb6e83baefc70e8dd271c7fbe42242035b0e2b2717589c250a8bce05c7493f83daa779319d3d8eceed2c07b8d965b7c64e5

    • \Users\Admin\AppData\Local\Temp\ÅÜÅÜ¿¨¶¡³µ.exe

      Filesize

      44KB

      MD5

      ab9b19a47ef00f0d552fee4937d2ab10

      SHA1

      b381044014e0c0561d0e08e9e256edb8022850cf

      SHA256

      1802d56348a9c7e54e8f2d7ea980b6a145fe6a3f5e95663517e01b5a9f8f8d67

      SHA512

      807ac051f7b3f97474dbf464c12cc3a4f3ac32a31c7b8c5019664012c62fff5fd0f973d34b4030dc871d6a4da62cf1130463781d97cddb5cf2eaee291e13023c

    • memory/1960-12-0x0000000002D80000-0x00000000030ED000-memory.dmp

      Filesize

      3.4MB

    • memory/1960-19-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/1960-11-0x0000000002D80000-0x00000000030ED000-memory.dmp

      Filesize

      3.4MB

    • memory/2660-34-0x00000000034A0000-0x00000000034A1000-memory.dmp

      Filesize

      4KB

    • memory/2660-32-0x00000000034A0000-0x00000000034A1000-memory.dmp

      Filesize

      4KB

    • memory/2660-43-0x0000000003490000-0x000000000357C000-memory.dmp

      Filesize

      944KB

    • memory/2660-42-0x0000000003490000-0x000000000357C000-memory.dmp

      Filesize

      944KB

    • memory/2660-41-0x0000000003490000-0x000000000357C000-memory.dmp

      Filesize

      944KB

    • memory/2660-40-0x0000000003490000-0x0000000003491000-memory.dmp

      Filesize

      4KB

    • memory/2660-39-0x0000000003490000-0x0000000003491000-memory.dmp

      Filesize

      4KB

    • memory/2660-38-0x0000000003490000-0x0000000003491000-memory.dmp

      Filesize

      4KB

    • memory/2660-37-0x0000000003490000-0x0000000003491000-memory.dmp

      Filesize

      4KB

    • memory/2660-36-0x0000000003490000-0x0000000003491000-memory.dmp

      Filesize

      4KB

    • memory/2660-35-0x00000000034A0000-0x00000000034A1000-memory.dmp

      Filesize

      4KB

    • memory/2660-45-0x00000000007A0000-0x00000000007A1000-memory.dmp

      Filesize

      4KB

    • memory/2660-33-0x00000000034A0000-0x00000000034A1000-memory.dmp

      Filesize

      4KB

    • memory/2660-44-0x0000000000320000-0x0000000000374000-memory.dmp

      Filesize

      336KB

    • memory/2660-31-0x0000000003490000-0x00000000035C0000-memory.dmp

      Filesize

      1.2MB

    • memory/2660-30-0x0000000003490000-0x00000000035C0000-memory.dmp

      Filesize

      1.2MB

    • memory/2660-29-0x0000000003490000-0x00000000035C0000-memory.dmp

      Filesize

      1.2MB

    • memory/2660-28-0x0000000000770000-0x0000000000771000-memory.dmp

      Filesize

      4KB

    • memory/2660-27-0x00000000007E0000-0x00000000007E1000-memory.dmp

      Filesize

      4KB

    • memory/2660-26-0x00000000007B0000-0x00000000007B1000-memory.dmp

      Filesize

      4KB

    • memory/2660-25-0x00000000007C0000-0x00000000007C1000-memory.dmp

      Filesize

      4KB

    • memory/2660-24-0x00000000003D0000-0x00000000003D1000-memory.dmp

      Filesize

      4KB

    • memory/2660-47-0x0000000000400000-0x000000000076D000-memory.dmp

      Filesize

      3.4MB

    • memory/2660-23-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/2660-22-0x00000000007D0000-0x00000000007D1000-memory.dmp

      Filesize

      4KB

    • memory/2660-21-0x0000000000400000-0x000000000076D000-memory.dmp

      Filesize

      3.4MB

    • memory/2660-46-0x0000000000780000-0x0000000000781000-memory.dmp

      Filesize

      4KB

    • memory/2660-50-0x0000000000400000-0x000000000076D000-memory.dmp

      Filesize

      3.4MB