Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 19:04

General

  • Target

    db16893f63cefae7ba34707685c0a4ad_JaffaCakes118.exe

  • Size

    289KB

  • MD5

    db16893f63cefae7ba34707685c0a4ad

  • SHA1

    cc54bc3311910573dc782e414b3d5e13371cf2dc

  • SHA256

    af08e293d2d0f042fcb5a44ec84d72a65b4a13a3ae4917ea312cee57ef148f97

  • SHA512

    ffa9c55bf91e57f8f208b69e03fc1d5e1911555727541d1f87a575b82d54201b5ac14af6b201e1172f3612bcd4d1aa15eca6ef1c1427a8f3901e961f83d29634

  • SSDEEP

    6144:Xkjoa4NCb6kIuy/w0AggOVMeKEyIYmoxdzy8xTVOrlVdck3Gyvz:Xeoa4bsowc1qeKE+i8xTVOrh2Uz

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db16893f63cefae7ba34707685c0a4ad_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db16893f63cefae7ba34707685c0a4ad_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\cctvv.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\cctvv.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Windows\SysWOW64\mspaint.exe
        "C:\Windows\system32\mspaint.exe"
        3⤵
          PID:1028
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 12
            4⤵
            • Program crash
            PID:112
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
            PID:2412
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 12
              4⤵
              • Program crash
              PID:1724
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""
          2⤵
          • System Location Discovery: System Language Discovery
          PID:4556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1028 -ip 1028
        1⤵
          PID:3368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2412 -ip 2412
          1⤵
            PID:1516

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat

            Filesize

            212B

            MD5

            7943838a5060eaf7e5cda262d0a63bdb

            SHA1

            0973d9cc6db750abab9478d0a1e9edf67da980bc

            SHA256

            5ba7964913efc2bd4b54e26f6b8c4fd2ce24d9ad81fb2d6d8f6b5b3c7449e85b

            SHA512

            f286241f38e466c769f5a381d3f62b7332f03b789a072d73cc9448303cfe1ce9c5da60e88fce2e1a6dd33f31e11c1dbd36f3429a8c56e52eef57fc29316bb6fb

          • C:\Program Files\Common Files\microsoft shared\MSInfo\cctvv.exe

            Filesize

            289KB

            MD5

            db16893f63cefae7ba34707685c0a4ad

            SHA1

            cc54bc3311910573dc782e414b3d5e13371cf2dc

            SHA256

            af08e293d2d0f042fcb5a44ec84d72a65b4a13a3ae4917ea312cee57ef148f97

            SHA512

            ffa9c55bf91e57f8f208b69e03fc1d5e1911555727541d1f87a575b82d54201b5ac14af6b201e1172f3612bcd4d1aa15eca6ef1c1427a8f3901e961f83d29634

          • memory/1028-11-0x0000000000400000-0x000000000050F000-memory.dmp

            Filesize

            1.1MB

          • memory/3124-8-0x00000000006D0000-0x00000000006D1000-memory.dmp

            Filesize

            4KB

          • memory/3124-16-0x0000000000400000-0x000000000050F000-memory.dmp

            Filesize

            1.1MB

          • memory/3896-0-0x0000000000400000-0x000000000050F000-memory.dmp

            Filesize

            1.1MB

          • memory/3896-1-0x00000000007D0000-0x00000000007D1000-memory.dmp

            Filesize

            4KB

          • memory/3896-2-0x0000000000800000-0x0000000000801000-memory.dmp

            Filesize

            4KB

          • memory/3896-17-0x0000000000400000-0x000000000050F000-memory.dmp

            Filesize

            1.1MB