Analysis

  • max time kernel
    93s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 01:01

General

  • Target

    cfeb3a72af97a396bb361f243d15abaf_JaffaCakes118.exe

  • Size

    569KB

  • MD5

    cfeb3a72af97a396bb361f243d15abaf

  • SHA1

    794e1fc68e02956a1bf8b1ece0361075f44e6485

  • SHA256

    099440391b25c625dfe3c631b0117ff0e4bb00d4b11d5de791cfd7d1a6abb135

  • SHA512

    820f7c41b61bfede862c7e11350e36c31dc900fbf8bae3ced41ddb42925a40752a6158cfb271e509aafd34cae3f11b0c05fe83a74158593317deb72489447eb2

  • SSDEEP

    12288:jDI3c4C1AWQo/mC0F3Z4mxx9nf4SOVNs4wmpag:jDIo1AWNmC0QmXpASqLpr

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfeb3a72af97a396bb361f243d15abaf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cfeb3a72af97a396bb361f243d15abaf_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:416
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" about:blank
      2⤵
        PID:3504
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\cfeb3a72af97a396bb361f243d15abaf_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 868
        2⤵
        • Program crash
        PID:928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 416 -s 872
        2⤵
        • Program crash
        PID:4484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 416 -ip 416
      1⤵
        PID:2244
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 416 -ip 416
        1⤵
          PID:3416

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/416-0-0x0000000000400000-0x00000000004DD000-memory.dmp

          Filesize

          884KB

        • memory/416-1-0x00000000022B0000-0x0000000002304000-memory.dmp

          Filesize

          336KB

        • memory/416-25-0x0000000002570000-0x0000000002571000-memory.dmp

          Filesize

          4KB

        • memory/416-24-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/416-23-0x0000000002510000-0x0000000002511000-memory.dmp

          Filesize

          4KB

        • memory/416-22-0x0000000002530000-0x0000000002531000-memory.dmp

          Filesize

          4KB

        • memory/416-21-0x0000000002550000-0x0000000002551000-memory.dmp

          Filesize

          4KB

        • memory/416-20-0x0000000002470000-0x0000000002471000-memory.dmp

          Filesize

          4KB

        • memory/416-19-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/416-18-0x00000000024B0000-0x00000000024B1000-memory.dmp

          Filesize

          4KB

        • memory/416-17-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/416-16-0x0000000002450000-0x0000000002451000-memory.dmp

          Filesize

          4KB

        • memory/416-15-0x0000000002460000-0x0000000002461000-memory.dmp

          Filesize

          4KB

        • memory/416-14-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/416-13-0x0000000002480000-0x0000000002481000-memory.dmp

          Filesize

          4KB

        • memory/416-12-0x00000000024A0000-0x00000000024A1000-memory.dmp

          Filesize

          4KB

        • memory/416-11-0x0000000003440000-0x0000000003442000-memory.dmp

          Filesize

          8KB

        • memory/416-10-0x0000000002430000-0x0000000002431000-memory.dmp

          Filesize

          4KB

        • memory/416-9-0x0000000003450000-0x0000000003451000-memory.dmp

          Filesize

          4KB

        • memory/416-8-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

          Filesize

          4KB

        • memory/416-7-0x0000000002410000-0x0000000002411000-memory.dmp

          Filesize

          4KB

        • memory/416-6-0x0000000000A90000-0x0000000000A91000-memory.dmp

          Filesize

          4KB

        • memory/416-5-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

          Filesize

          4KB

        • memory/416-4-0x0000000002420000-0x0000000002421000-memory.dmp

          Filesize

          4KB

        • memory/416-3-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

          Filesize

          4KB

        • memory/416-2-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

          Filesize

          4KB

        • memory/416-28-0x0000000003460000-0x0000000003461000-memory.dmp

          Filesize

          4KB

        • memory/416-27-0x0000000000A80000-0x0000000000A81000-memory.dmp

          Filesize

          4KB

        • memory/416-26-0x0000000000A70000-0x0000000000A71000-memory.dmp

          Filesize

          4KB

        • memory/416-32-0x0000000010410000-0x000000001048C000-memory.dmp

          Filesize

          496KB

        • memory/416-40-0x0000000000400000-0x00000000004DD000-memory.dmp

          Filesize

          884KB

        • memory/416-41-0x00000000022B0000-0x0000000002304000-memory.dmp

          Filesize

          336KB