Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 11:55

General

  • Target

    d97e44af02ff031135eacfa467583020_JaffaCakes118.exe

  • Size

    651KB

  • MD5

    d97e44af02ff031135eacfa467583020

  • SHA1

    c8302a5900ca1bf098932c7d10490fa827804fa5

  • SHA256

    c47e0fc5535a4ab05f795df56e79989fe5712387fad5b23eadd284678dae79f0

  • SHA512

    17acba0c7bad982c62400e6d5bd2c6ef7eafaa00574e6db968c9f293db0b37729ce245056e1eaff50bd213a946fd33c47606ac9afc72b6e3b4efe45713d964a5

  • SSDEEP

    12288:kpyZT1urCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx1ujOD3SxcDDcNDqWYurL0

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Modiloader family
  • ModiLoader Second Stage 11 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d97e44af02ff031135eacfa467583020_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d97e44af02ff031135eacfa467583020_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\d97e44af02ff031135eacfa467583020_JaffaCakes118.exe
      d97e44af02ff031135eacfa467583020_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\dHY4IvP3.exe
        C:\Users\Admin\dHY4IvP3.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Users\Admin\pgsuoh.exe
          "C:\Users\Admin\pgsuoh.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4240
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del dHY4IvP3.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3000
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4188
      • C:\Users\Admin\azhost.exe
        C:\Users\Admin\azhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Users\Admin\azhost.exe
          azhost.exe
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:3128
      • C:\Users\Admin\bzhost.exe
        C:\Users\Admin\bzhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\bzhost.exe
          bzhost.exe
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:1696
      • C:\Users\Admin\czhost.exe
        C:\Users\Admin\czhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4140
        • C:\Users\Admin\czhost.exe
          czhost.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2368
      • C:\Users\Admin\dzhost.exe
        C:\Users\Admin\dzhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4604
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
            PID:4232
        • C:\Users\Admin\ezhost.exe
          C:\Users\Admin\ezhost.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1000
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del d97e44af02ff031135eacfa467583020_JaffaCakes118.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4092
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3704

    Network

    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      104.219.191.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.219.191.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      67.31.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      67.31.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      13.86.106.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      13.86.106.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      228.249.119.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      228.249.119.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      56.163.245.4.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      56.163.245.4.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      86.49.80.91.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      86.49.80.91.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      19.229.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      19.229.111.52.in-addr.arpa
      IN PTR
      Response
    • 127.0.0.1:80
      dzhost.exe
    • 127.0.0.1:80
      dzhost.exe
    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      104.219.191.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      104.219.191.52.in-addr.arpa

    • 8.8.8.8:53
      67.31.126.40.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      67.31.126.40.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      13.86.106.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      13.86.106.20.in-addr.arpa

    • 8.8.8.8:53
      228.249.119.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      228.249.119.40.in-addr.arpa

    • 8.8.8.8:53
      56.163.245.4.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      56.163.245.4.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      86.49.80.91.in-addr.arpa
      dns
      70 B
      145 B
      1
      1

      DNS Request

      86.49.80.91.in-addr.arpa

    • 8.8.8.8:53
      19.229.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      19.229.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\azhost.exe

      Filesize

      248KB

      MD5

      27ef898ce7ec9c0b79a6996a0b419de1

      SHA1

      4e8aed756fbc6133af13028c33366d2eaa43f954

      SHA256

      f08df8dd8e3fe3de4a1ba4ba3bd355a233cf7febd5917b982ec5a949726c36a6

      SHA512

      5c7fa67e7ed1e8ce238e58f0b55618d1fc13af4e19d9267f6e88e277beb2f10e6c0f0027a532a2d1d4b6e40da1b31dfcacf50ccb71a75dc231ff876869b6787a

    • C:\Users\Admin\bzhost.exe

      Filesize

      138KB

      MD5

      4e22775699416e81275fea3266e14bba

      SHA1

      32cc2479a30abd1b40b3b7e959ac32317fa124fd

      SHA256

      95dc812e94d5ba0842af45685ca7262b55607336fcf4becda83dbb6416beffa9

      SHA512

      34b13e9142a9c4251c78d876f02f9e86f22253950d3f9126dacd8ec6f0f3bbd36146381ce16b130d794c4bbc1ba08aa4df8e2e7af0c3900035d486242c81e3bf

    • C:\Users\Admin\czhost.exe

      Filesize

      96KB

      MD5

      fb7e8882346223dfbad778b5a7f74f32

      SHA1

      8285032fbab2f9f52533657d46df457ab64d0e15

      SHA256

      6d6fa60b26cd2fc87c94afb20e7f3b35d6eca76d5a46191b8df802d30d4cbc3e

      SHA512

      31e3963dd156da4a57b3ffd37b857ee1d433c61dc22eb56356f2171b282f3735a1c31d65b3a0b431151b55bfebf964f82c5aa13a12f1c2a8a580840a7ea5da32

    • C:\Users\Admin\dHY4IvP3.exe

      Filesize

      288KB

      MD5

      e2a16fca33158332dbb3c66021fe8e3b

      SHA1

      9b784a05bf73e0bffbc2d6afe9acb4ca9d44a355

      SHA256

      17b36341825621fdf4a959b52c510dbf1295e89d380499b2d02a87d76ed68a82

      SHA512

      6ec42b9cbd79a0835abdb2e7e4484d143bea726d9d17929482d1efb16590d895bcbe24e7957dcfc26f093f7a6d1dc07644c649d5918227f101a2515dddb86550

    • C:\Users\Admin\dzhost.exe

      Filesize

      221KB

      MD5

      5b414fb77d0dbec97ee529ec0bbcbeaf

      SHA1

      359cd24cd341f75eb46b99375824f6b649443f8e

      SHA256

      62027b13d4918e5e644952c977960a5e6dfe241e2bb35b387de0bfd0b752e882

      SHA512

      887b1b93e51d21927ffba49536f281003eef1dbee7634a08cab256f07701d54fe755acab7ae4a513c754067e4144c44c3580689ce187fd584ba440ab748a2360

    • C:\Users\Admin\ezhost.exe

      Filesize

      28KB

      MD5

      46ede15ce82c221c24bf81b2de1be7e8

      SHA1

      c332a5ec7aeb213c13449626156f6623351a4393

      SHA256

      a360c27de3799bf85f2501d4b375744394643fd50f8ecf5241d170b5cb7f6782

      SHA512

      517f497a4783a0f67ccfca641d93b7f20505c89d6252229f5b97df674f7be20ae48d4732c137ba081c2c1f8ec712371fa4ba4602873e11c0e02b109a00b6c316

    • C:\Users\Admin\pgsuoh.exe

      Filesize

      288KB

      MD5

      69e8711ac9476f7699551b91cf75a858

      SHA1

      e940cbe09b9dcfcfa14569eba0d8fe2f06e1e419

      SHA256

      3ba81311ad36ba3f5ce4b599f5cf7eac36c304d6a41d4718461ebb2551b58229

      SHA512

      0cc8e4b29764f18a9efbc2696bf08707ae61fbe8f0160114081abf8a3cd4fbd0926eac9206133ec6bb6e85f5f7f1d97a93dcd960a193ef8f76f6de7c874cf369

    • memory/1372-71-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1696-101-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1696-74-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1696-73-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1696-68-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1696-67-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2216-5-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2244-4-0x0000000000400000-0x0000000000507000-memory.dmp

      Filesize

      1.0MB

    • memory/2244-1-0x0000000000400000-0x0000000000507000-memory.dmp

      Filesize

      1.0MB

    • memory/2244-65-0x0000000000400000-0x0000000000507000-memory.dmp

      Filesize

      1.0MB

    • memory/2244-6-0x0000000000400000-0x0000000000507000-memory.dmp

      Filesize

      1.0MB

    • memory/2244-122-0x0000000000400000-0x0000000000507000-memory.dmp

      Filesize

      1.0MB

    • memory/2244-0-0x0000000000400000-0x0000000000507000-memory.dmp

      Filesize

      1.0MB

    • memory/2244-8-0x0000000000400000-0x0000000000507000-memory.dmp

      Filesize

      1.0MB

    • memory/2344-60-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2368-86-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2368-85-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2368-78-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2368-79-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2368-84-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/3128-56-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB

    • memory/3128-55-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB

    • memory/3128-91-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB

    • memory/3128-61-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB

    • memory/3128-57-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB

    • memory/3128-54-0x0000000000400000-0x0000000000437000-memory.dmp

      Filesize

      220KB

    • memory/4140-82-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4604-89-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB

    • memory/4604-94-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.