Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 19:22

General

  • Target

    e7e4fc0e0f15a1a06b7568a28d31444f_JaffaCakes118.exe

  • Size

    369KB

  • MD5

    e7e4fc0e0f15a1a06b7568a28d31444f

  • SHA1

    2f30ac64766ef76ca0b91ec1fd9822471b84ddbc

  • SHA256

    e0b2776449a62021edd9c6db50687ca7d5fa80a974f1198f2125c6deb6db9b43

  • SHA512

    609c6c29ea5d3ba8c4afe6519b31c10e7170f48e3b88d21dbe4f21381d2741fa32aa79b6382b7ca91fd0df30198e9b7173656e80c855b3c4d3f832ba233e79da

  • SSDEEP

    6144:JkX3FZVXXIzo0mSoEbLU07+tlVpu8gprhnp0uzlbKpC2sglxDUfksFtGnE74pW:JkX3fVyo0mSon07uru8mHsC2def8Y4pW

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7e4fc0e0f15a1a06b7568a28d31444f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e7e4fc0e0f15a1a06b7568a28d31444f_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 272
      2⤵
      • Program crash
      PID:3480
    • C:\Windows\SysWOW64\avb.exe
      C:\Windows\system32\avb.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:4252
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 252
        3⤵
        • Program crash
        PID:2160
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\Dasnl.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4056
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3148 -ip 3148
    1⤵
      PID:3172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4252 -ip 4252
      1⤵
        PID:3868

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Dasnl.bat

        Filesize

        212B

        MD5

        6f2594b4bcb242a095c7e7d5353e237d

        SHA1

        dd7f92cc1bf2969f9369beb2ac91f742f62e742e

        SHA256

        d44704d531fdef8efb49d8b0edb4b1805bf7f06e2e6611b30c326f4221f4017a

        SHA512

        03160b06781b41d72403a519ca4d45894e9bd7edc37017d5fe4a7383b71f0f03005281d0c718054c3f466cac2c45941af536eed439541ea9d984861d8076a939

      • C:\Windows\SysWOW64\avb.exe

        Filesize

        369KB

        MD5

        e7e4fc0e0f15a1a06b7568a28d31444f

        SHA1

        2f30ac64766ef76ca0b91ec1fd9822471b84ddbc

        SHA256

        e0b2776449a62021edd9c6db50687ca7d5fa80a974f1198f2125c6deb6db9b43

        SHA512

        609c6c29ea5d3ba8c4afe6519b31c10e7170f48e3b88d21dbe4f21381d2741fa32aa79b6382b7ca91fd0df30198e9b7173656e80c855b3c4d3f832ba233e79da

      • memory/3148-0-0x0000000000400000-0x00000000004A73BC-memory.dmp

        Filesize

        668KB

      • memory/3148-1-0x00000000024C0000-0x00000000024C1000-memory.dmp

        Filesize

        4KB

      • memory/3148-13-0x0000000000400000-0x00000000004A73BC-memory.dmp

        Filesize

        668KB

      • memory/4252-7-0x00000000022B0000-0x00000000022B1000-memory.dmp

        Filesize

        4KB

      • memory/4252-11-0x0000000000400000-0x00000000004A73BC-memory.dmp

        Filesize

        668KB