Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2024 06:31

General

  • Target

    d1151f89e8295615940edeb7ea5181de_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    d1151f89e8295615940edeb7ea5181de

  • SHA1

    63a8776789ada642235461b91df1de772acbe970

  • SHA256

    dcd57c59e680469787cc5054eccfd21531af594a7a14b9e2171d49678476b97f

  • SHA512

    cb2f0b9cf61a76f33d765793eb3a60fc7e322feb7334c726fcc575db8dd28d38059ba103445fecab09fe9f93b741cf35d73b10020f2f6bcabc70d8f131423a54

  • SSDEEP

    49152:mJFZawJWHiuR5ZbyTyH5c//////9ic1TjvDQ44c//////zW5:mJFoy+FyTyZc//////9lRDj4c//////0

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1151f89e8295615940edeb7ea5181de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d1151f89e8295615940edeb7ea5181de_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HackWm.ini

    Filesize

    477B

    MD5

    7a130530b66e511d28f8efdae1361f2d

    SHA1

    1f73859de24078bdf317399af49242c51949ed55

    SHA256

    16214d14f15ee698f6edbd107a72062df2ece190746b9fcc96557b4d65280399

    SHA512

    cc5c7baea7172893c05fcedbd61170523525bfc4c1d7063ba6e62a778225a0c0a8657cfd1b65e8ca10027bf89ac34ca1c865f2006e16ec5859af1b932cbb1d2c

  • C:\Users\Admin\AppData\Local\Temp\HackWm.ini

    Filesize

    475B

    MD5

    3d789700820b287d288bbf0ba1fed5fa

    SHA1

    5aeed2783cf4adaa261d58b54680df04683e6a1a

    SHA256

    88b13dcb7cf3d1db49b81309cd1fe34e26530b65faa0801579cad2ed450e93c8

    SHA512

    7318f25066adcae4ec90959f4fcf3c392a3cfdd15a0db1f65ad50f4256b0dded3969b95eea3a079c1ebbb28180f4b353ecf804ec006175be0afc40933fd69f50

  • memory/2516-0-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/2516-24-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB

  • memory/2516-33-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/2516-34-0x0000000000400000-0x0000000000670000-memory.dmp

    Filesize

    2.4MB

  • memory/2516-35-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB