Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-12-2024 18:42

General

  • Target

    f0277a027c4e4d174b2cf996e526f77a_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    f0277a027c4e4d174b2cf996e526f77a

  • SHA1

    fc9203736c162d4f940af4f7f82b28a9020f2e5d

  • SHA256

    d8e8c6c9b6f7241fa53a6ee9c7ceb0c5b8914608c49b5de154755a8af252229b

  • SHA512

    1e88bad8ad513d8a3cc3cd9e800e6de63458d260fcbfcbb0bfedcc251bb2b3762b731b63e098ba93c6ad22dea13a3f8543faff3d65628a111d96e5a396cc8385

  • SSDEEP

    24576:N67T4oQm/5Rvy4w7U+wYItAxOqC8+d4vJzT7RJ1deXkWhe:NSQ7ULeOv8ymFXTgkQe

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\f0277a027c4e4d174b2cf996e526f77a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f0277a027c4e4d174b2cf996e526f77a_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1916
        • C:\Users\Admin\AppData\Local\Temp\TRK.exe
          "C:\Users\Admin\AppData\Local\Temp\TRK.exe"
          3⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2268
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\TRK.exe

      Filesize

      561KB

      MD5

      1a33f0dda2d99acba2eb2b817387ed21

      SHA1

      6e02ffa003f4362b652856eab4335fa34e131c32

      SHA256

      3da541200b2b3ee136f61e83a41307db33441301feeb351e30f1f0d292a643ec

      SHA512

      2893d5fce8f64c51f540789a357c73292e9cab2315f7c402ab3d031173898615dbf3bd16f521676515718b8e8086da7eb0c484a6fd8af7f399bbdf78fad2b6fe

    • \Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      555KB

      MD5

      be67118dce14cc30d470f4409488ecf3

      SHA1

      633aa1e4ead28cfe355113b0605405d94818b407

      SHA256

      9238440a35c721cb69a16a027f4f641fa14ca5b1ca81b26709cfbd29bc43efcb

      SHA512

      23059600951a6de13c5203231036f62fbaace7282443a248d8357f9c35ff1190c7d5b65414a7cb5d54b179d07a1726cd47daa8ab3c2f38ad2a098961ee9040cb

    • memory/1216-24-0x0000000002E40000-0x0000000002E41000-memory.dmp

      Filesize

      4KB

    • memory/1916-26-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/1916-27-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2268-20-0x0000000000401000-0x000000000041C000-memory.dmp

      Filesize

      108KB

    • memory/2268-28-0x0000000000400000-0x0000000000547000-memory.dmp

      Filesize

      1.3MB

    • memory/2268-30-0x0000000000400000-0x0000000000547000-memory.dmp

      Filesize

      1.3MB