Analysis

  • max time kernel
    95s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 17:36

General

  • Target

    f50868f65ddb1b12178bb7c7d4e4b3ec_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    f50868f65ddb1b12178bb7c7d4e4b3ec

  • SHA1

    e0cefd600294779b6886332b151faa30862007de

  • SHA256

    1b3fadc458c740215d96904cbd3be13bd5cc0664d9318016bc0bf17cb1ee9c58

  • SHA512

    fc05dd6f5d27ad250c812a6f8fc32fa4c525d9af13f4d127120d9962122e74b8520443903d239e038532c4d7c63d60afcaa4124f63c706934e9234c1d46291d3

  • SSDEEP

    1536:a6E47mqYUQp7cIYp2SuNXqAtUsDEIa5Q5ENksepHpq2t0raJJjnMmXAv:a6GU2cIYpIXbaI+Q5eCpHpq2t0EjMmwv

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f50868f65ddb1b12178bb7c7d4e4b3ec_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f50868f65ddb1b12178bb7c7d4e4b3ec_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\microsoft shared\MSInfo\atmQQ2.dll

    Filesize

    25KB

    MD5

    ceb758b473c9783a3237df80a2df5fbe

    SHA1

    2d13e557e00df7b6ccb4324229ed71a6b6fb309f

    SHA256

    72241d2f9e7981f55db01f0c561277a56c9ec01e4fb430b5e9406e4f512d32dc

    SHA512

    425666da44b76958f2da870f8ae65506c3c6dea23ce10c1cdd588ab05ffb989e6e2b1413cf95b9717f8a25159fc6e1ee30f2f9449d3598fbda6806ea1730f570

  • memory/4076-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/4076-6-0x00000000009D0000-0x00000000009EF000-memory.dmp

    Filesize

    124KB

  • memory/4076-8-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB

  • memory/4076-9-0x00000000009D0000-0x00000000009EF000-memory.dmp

    Filesize

    124KB

  • memory/4076-10-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/4076-11-0x00000000009D0000-0x00000000009EF000-memory.dmp

    Filesize

    124KB

  • memory/4076-12-0x00000000009F0000-0x00000000009F1000-memory.dmp

    Filesize

    4KB