Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 03:06

General

  • Target

    e9988c71033c0c888f5239f7759b54b5_JaffaCakes118.exe

  • Size

    875KB

  • MD5

    e9988c71033c0c888f5239f7759b54b5

  • SHA1

    9eaf4ca159f25e8b8cf26f669aea877c6765678b

  • SHA256

    40de2e88eb2d82e8b2b5ab8735dd2f71e71dadc03e2e4bd818246062724abe8f

  • SHA512

    c8119f71b2aae342387247731db63123ca0c080fb3202f179c60f5c2e8044f31c5ed4a2aef11668847c18bab9033038620e7380dbb523532dddfec512d327dbd

  • SSDEEP

    24576:w2O/GlJXysWPUt5fiAx7XFT3YVNOgwXkfjvILisFSvRA6WcUXq2:0LAxhSN7wqvILdFSO6Wc0q2

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader First Stage 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 41 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9988c71033c0c888f5239f7759b54b5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9988c71033c0c888f5239f7759b54b5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Program Files (x86)\Screen 2 WebFlash 1\webflash.exe
        "C:\Program Files (x86)\Screen 2 WebFlash 1\webflash.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1220
      • C:\Program Files (x86)\Screen 2 WebFlash 1\webflash.exe
        "C:\Program Files (x86)\Screen 2 WebFlash 1\webflash.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2612
      • C:\Program Files (x86)\Screen 2 WebFlash 1\webflash.exe
        "C:\Program Files (x86)\Screen 2 WebFlash 1\webflash.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Screen 2 WebFlash 1.0\Screen 2 WebFlash 1.0.lnk

    Filesize

    1KB

    MD5

    8f27cc5dcf993c6b165faa617a1186ce

    SHA1

    32d7d7f5723253fbcf235b63261ff88be42c9445

    SHA256

    ce9a954245c58cc613e037fb7cf79e76f86270bfead68e5f99f9e15832cff214

    SHA512

    8d455dd21fe3e04d0100ddc16cb511a5cc7f9727da71ce2b23b51ae7d7f853ea29509ab534dbe4b80ae3a3f7283b6e4af5887f7d6bd227b4162684c149ffc5f9

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GrafikRW.dll

    Filesize

    610KB

    MD5

    20fbdd9f89014a8e01cfd3a17beaa0c0

    SHA1

    3122a2848b893673c385a7c87a14f804ca6bc7d3

    SHA256

    4f2a0c109d51a289744276b7d943d8ce678fcec7f1bfc3ffbe55683b6ece7d02

    SHA512

    54890f9abd55e60a2e0bf5552a00c57723d409696c0ad2ace63509d1c0c46aa7e4059139ff754fa945d10999806b61644dd0c32728d0c79a5704f7addd4001f9

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.log

    Filesize

    394B

    MD5

    983af125b036026f42600ac766bf6007

    SHA1

    6a563a45580624f81bc226aed49d3e75f335e2fa

    SHA256

    6f1e472a33edd813018e2d5c7bff20469cfb8a965b2488259537173740086112

    SHA512

    57e4df0f2b36418cb93ff2e4f779f109bb8a95a20977551238e28ca61fc264291690a416881a5efe1ba0974c2905ef7ca2d07bec127e2f0868603ff6915a56c5

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cadkasdeinst01e.exe

    Filesize

    80KB

    MD5

    5bc0f9317b2d9309a60519bf5dd74093

    SHA1

    727e274046e223733695f371b199371c46b50707

    SHA256

    02dd77caabecca810ca31dc06fe8f4e1580c76528b2fce9e54aa12092196d43b

    SHA512

    1649cc8737332e589e828620851fa6fdb8110061190ce10035fc6af7e4d2a7273d65a6fc7eb534b2debc031cbc22b01c9ee6f6753d0f9e062ff77b9b854cb723

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\file_id.diz

    Filesize

    1KB

    MD5

    a3ce6addf7808468211a26062929310d

    SHA1

    58d3f3e01ffe18d7b8d72acd2cd1a6d5aa038bb2

    SHA256

    432ba8f83fbbf4f98813a9f9431ee62d8b6c7b5b6eb4f1473981415756956b69

    SHA512

    bc0029a0c27d96e7d3ebb976ce4fae708c32782b40f2f8eb9539bd939dd65aa555d8207054c82678653760f98a35ed98f45c689029071edf46ab4ccd734581dd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\flash.chm

    Filesize

    12KB

    MD5

    f1e7538dc8a2f141a0e8d9d6cfcd16c2

    SHA1

    258090866bef06205344993f22b436892b60deb9

    SHA256

    a97d0a53bf2bbb7dfac98feaf73688443fd01be107b915df8afcddd58fdfbe61

    SHA512

    3433d605f5f198ffcaa05ebef065a48e7e0010fbe81722c7eb60a26925758c99695264404bb903604f3d84dd37ef617c4bf73406e7a686d37463bd6fa2e38a6f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\manual.txt

    Filesize

    3KB

    MD5

    184e112d7af630de517d2dbfae6f4d56

    SHA1

    560af293f56f487fe51f7705652ac31d07f1d95d

    SHA256

    bb6f4397eadef4d1083b0268a458c3240335bfa12e90d201e5809471a22d7125

    SHA512

    0bee5ec25285e5b7badf38f80d5d902e7bd947fb2c2e8a5fbd0113e83019794dcdb1ef7d9808b509c27e53f6fe9443cd2b8349a6bad161d8cbb012a30c7d75c0

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\order.txt

    Filesize

    318B

    MD5

    5e53a96f02a6f8eb5895c6bc54714a3e

    SHA1

    f4925c9d95c7d905eaecfff27f74c7c88a8247bc

    SHA256

    9b05d25a897485b581fb88e37c9ef67cb2a4a783a8836712acc193d10c73f06f

    SHA512

    bf88ce085e4956bb8e21128e9912a7e6682159070d818669ee18b6de27e92dafa84b927a969d6e5c2ad24a72bcdee66695594734d39b667872f27a55f6668683

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\webflash.exe

    Filesize

    1.3MB

    MD5

    89fc78e93cfd3b127e1708daa826c425

    SHA1

    8eb64f06bc6618e2192ed736f216a2e1f7da0334

    SHA256

    892327145e2429c61bb179f87f62be4f71cd220bc3db921f33c5add3696e658e

    SHA512

    1966a20b773c4c92ed672428670be982aaf9168491e2b1e9622f682624e3288155297c8dad81d66eb5b3edffc6da8053234fc1a19a86db89edfb6a4d4099df31

  • C:\Users\Admin\Desktop\Screen 2 WebFlash 1.0.lnk

    Filesize

    1KB

    MD5

    a1603225dc63a0e30c4dea3537286d91

    SHA1

    c97a32099528116ceabe130c3fa1d6f7f8d7c130

    SHA256

    ed98717ced4918031efdd71e355673afa8a9305d6a75a1d2d7f5c409d517fb39

    SHA512

    651bbb3aaa074010bf6b4185049b1c0c0ab6c2c72644f9b8e4cd3255797e3bf5eeace7c06a5f6f39469aedf3f59671c4f634374bf036132e2932f7d3ff39a7dd

  • \Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe

    Filesize

    92KB

    MD5

    a5e4d12b2766075ebaea8de2ad4865b9

    SHA1

    5de886f171824e35b78160e7a24864e538d5d0ae

    SHA256

    3a8dbe69d4e83c762d287e4c9b9ec1a2319bc362f95f99937d3d03d8dc0b35e6

    SHA512

    c9d3d9ffce6fe46e81567450662307e49886d4210e2fb75d537a5ac09a43bf0c8d25a79e47204d793930ebfaf216dc4f383f588b614eec06596038112a0fbd3f

  • memory/1148-260-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/1220-116-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/1220-198-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2612-258-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2612-200-0x0000000000400000-0x0000000000553000-memory.dmp

    Filesize

    1.3MB

  • memory/2892-167-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-162-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-187-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-141-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-199-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-136-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-219-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-225-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-256-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-114-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-68-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-261-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2892-286-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB