Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 19:04

General

  • Target

    db16893f63cefae7ba34707685c0a4ad_JaffaCakes118.exe

  • Size

    289KB

  • MD5

    db16893f63cefae7ba34707685c0a4ad

  • SHA1

    cc54bc3311910573dc782e414b3d5e13371cf2dc

  • SHA256

    af08e293d2d0f042fcb5a44ec84d72a65b4a13a3ae4917ea312cee57ef148f97

  • SHA512

    ffa9c55bf91e57f8f208b69e03fc1d5e1911555727541d1f87a575b82d54201b5ac14af6b201e1172f3612bcd4d1aa15eca6ef1c1427a8f3901e961f83d29634

  • SSDEEP

    6144:Xkjoa4NCb6kIuy/w0AggOVMeKEyIYmoxdzy8xTVOrlVdck3Gyvz:Xeoa4bsowc1qeKE+i8xTVOrh2Uz

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db16893f63cefae7ba34707685c0a4ad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db16893f63cefae7ba34707685c0a4ad_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\cctvv.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\cctvv.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\mspaint.exe
        "C:\Windows\system32\mspaint.exe"
        3⤵
          PID:1148
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 280
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:2500
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""
        2⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\Delet.bat

      Filesize

      212B

      MD5

      7943838a5060eaf7e5cda262d0a63bdb

      SHA1

      0973d9cc6db750abab9478d0a1e9edf67da980bc

      SHA256

      5ba7964913efc2bd4b54e26f6b8c4fd2ce24d9ad81fb2d6d8f6b5b3c7449e85b

      SHA512

      f286241f38e466c769f5a381d3f62b7332f03b789a072d73cc9448303cfe1ce9c5da60e88fce2e1a6dd33f31e11c1dbd36f3429a8c56e52eef57fc29316bb6fb

    • \Program Files\Common Files\Microsoft Shared\MSInfo\cctvv.exe

      Filesize

      289KB

      MD5

      db16893f63cefae7ba34707685c0a4ad

      SHA1

      cc54bc3311910573dc782e414b3d5e13371cf2dc

      SHA256

      af08e293d2d0f042fcb5a44ec84d72a65b4a13a3ae4917ea312cee57ef148f97

      SHA512

      ffa9c55bf91e57f8f208b69e03fc1d5e1911555727541d1f87a575b82d54201b5ac14af6b201e1172f3612bcd4d1aa15eca6ef1c1427a8f3901e961f83d29634

    • memory/1148-18-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1148-22-0x0000000000400000-0x000000000050F000-memory.dmp

      Filesize

      1.1MB

    • memory/2372-27-0x0000000000400000-0x000000000050F000-memory.dmp

      Filesize

      1.1MB

    • memory/2372-11-0x0000000003100000-0x000000000320F000-memory.dmp

      Filesize

      1.1MB

    • memory/2372-2-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2372-0-0x0000000000400000-0x000000000050F000-memory.dmp

      Filesize

      1.1MB

    • memory/2372-1-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2372-35-0x0000000000400000-0x000000000050F000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-14-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/3020-13-0x0000000000400000-0x000000000050F000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-37-0x0000000000400000-0x000000000050F000-memory.dmp

      Filesize

      1.1MB

    • memory/3020-38-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/3020-39-0x0000000000400000-0x000000000050F000-memory.dmp

      Filesize

      1.1MB