Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 02:01

General

  • Target

    f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    f6c65d3d7783d6c6b21383e4ee50f6d0

  • SHA1

    28f16d6c44991249b52af17e134649bfd1911ad6

  • SHA256

    b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4f

  • SHA512

    f9b5d9b1de92039f6c06994a7ac4dfaede3abf51e085fad07f52ae227910eab21e0e1c984812800debc90dccbd08698bb7c845c434a36a4766511173cc9bfa68

  • SSDEEP

    6144:c9ctxJKFzDz8KFykipAjWnt7Q4VonPGgmFrrDciW1oreICFpz7K/obXko4:c6XKxYKBipBgBmFrrDcixeIkp6/GXko4

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 32 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1064
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
        PID:1092
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1148
          • C:\Users\Admin\AppData\Local\Temp\f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Users\Admin\AppData\Local\Temp\f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe
              f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe
              3⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2768
              • C:\Users\Admin\AppData\Local\Temp\update2.exe
                "C:\Users\Admin\AppData\Local\Temp\update2.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2780
                • C:\Users\Admin\AppData\Local\Temp\update2.exe
                  C:\Users\Admin\AppData\Local\Temp\update2.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2604
                  • C:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe
                    "C:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe"
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2900
                    • C:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe
                      C:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe
                      7⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1540
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp493bed56.bat"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:2196
              • C:\Users\Admin\AppData\Local\Temp\update1.exe
                "C:\Users\Admin\AppData\Local\Temp\update1.exe"
                4⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of UnmapMainImage
                • Suspicious use of WriteProcessMemory
                PID:2548
                • C:\Users\Admin\AppData\Local\auditpol.exe
                  "C:\Users\Admin\AppData\Local\auditpol.exe" C:\Users\Admin\AppData\Local\Temp\update1.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of UnmapMainImage
                  PID:776
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1220
          • C:\Windows\SysWOW64\DllHost.exe
            C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
            1⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2228
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2476
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:3008

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

              Filesize

              2.0MB

              MD5

              eeb16755e50c61dae015e219bc37d714

              SHA1

              c0cf8cc2f22aed5b6bf602ca8fd3f8398cc8d945

              SHA256

              877aba7fd3580a1bceb3fddaa81ebb7a6a671ff110a4a62e466df53324acf534

              SHA512

              89d8428dbf89a65be0c0c0c8deb0132ebb70b8581726fa3b8bca14c276912bd4ee0589af69a892b4881f0c1b2e168788b45a6c0791073e6d7f1fa3deaa072523

            • C:\Users\Admin\AppData\Local\Temp\tmp493bed56.bat

              Filesize

              193B

              MD5

              2b770d96a0d94d0a278991262c7fad0e

              SHA1

              25f8b66ad246bc9f71afccf7118e0691f011da02

              SHA256

              d5c03c966e485b41a3a7d4b16d2427b2c36b7bec2e82076cb174528ae392a58b

              SHA512

              7795b99c1f85a26e69619407b829d602576798cc4b771876e8a52bf813d64611686e982b875997bdd8337e0e4f176c8ab0e7f372578ff7d51ed34d2ee6a04c77

            • C:\Users\Admin\AppData\Local\auditpol.dll

              Filesize

              24KB

              MD5

              91029d37cf86ecc5d58605676eab6643

              SHA1

              e6b6bcd7bb30b8c8bb05489a89238eb4793c38fe

              SHA256

              d4bda0161466452d3f75d14472720d95d168ac09e2d63fedef45538576f98e0b

              SHA512

              377b33a534f955e48299f2532216482ee14ae17a4e52a44b2a40b98c4b274505e60fb1c07c61f4e84644644fd4757f8dcefc12359712fe53ad9e4122bd12961e

            • C:\Users\Admin\AppData\Local\auditpol.exe

              Filesize

              64KB

              MD5

              9f036c83663c4a3e5f5382adf6f32bcc

              SHA1

              842870e3dfb3ee76e927d93c517f9753c872d751

              SHA256

              4eeef6ad75578f995af8f662d5a33581fafb19de9b5dd1fb7d9294fa80172874

              SHA512

              097b79b332810ff212fe59c60f2480c99538f8b0309c35c2955d9e5c677047569edadc8669cbf82ca21667ec71449f3e34542c8d24b065845efe228eaaae13c9

            • C:\Users\Admin\AppData\Roaming\Esuwu\touti.tue

              Filesize

              668B

              MD5

              8808ce87b6e0fb61f4bdeacbafebbed4

              SHA1

              5a0dc188cc8f822bfd80d0bd49984775432731fc

              SHA256

              41c235c508b86cd8221d11e3f574d08915251fd6f9c86c74481ff9b2ab12c98b

              SHA512

              bec4949cefba10cd3e857e6070b75b54acf4c28056f5455fd1cb31a0cad5e592ddd8cc3d67bd303f19adb147d9cd5ab415a715e8c15b9ef6e9a1bc2cf25fa246

            • C:\Users\Admin\AppData\Roaming\Esuwu\touti.tue

              Filesize

              1005B

              MD5

              112e18967b8970ac0a6e327829ac3b9a

              SHA1

              0a889ed24b90ed877b912e30440154c46fca8205

              SHA256

              ed04cb265356d86d787d5b5d16cd07bd12402dbb63e91d48d40849a9be769822

              SHA512

              f6306cb8e75d091d1c5708bbe1b038005c7dce6db0f8dc9c3f53f558dab7d9b9714a56b89ee7980f4a4ee96a72e92fecc2cf95b893ac5ce5fa4f419ed6cb54f1

            • C:\Windows\System32\drivers\etc\hosts

              Filesize

              884B

              MD5

              3f0493d494f1ca681c73976f4f97c262

              SHA1

              51766ebd206c8a62b3e1604fd64ac7be896fe909

              SHA256

              aa4f8c0fff53953056dff9c26af2c2bb97245c32d523982981d307270f48a308

              SHA512

              ea7a4717238285dbce3336d30410d8647ebfa37d858f92c555f8d0ce2722516ad435d2f8bad2359699fbfe84094b1464795f8657bf7d570aea761abef5027b6b

            • \Users\Admin\AppData\Local\Temp\update1.exe

              Filesize

              144KB

              MD5

              de8b2505379dc0690000155dc1d4b849

              SHA1

              a9a703a20b6536d3d80f5e657b26c409e00c4162

              SHA256

              f3e0cb8e1603b70209208e67961d9c5cc0b07e31e1cfebcffb2603218ab7dd50

              SHA512

              9d1ec27407edc66867083bb27d3f6fa37040948ebdf19a9ab55dc280d33c5525294a92ccde24dbb0985e67aba058080a169a52531a081a6d0cb46cf41e5ff2d8

            • \Users\Admin\AppData\Local\Temp\update2.exe

              Filesize

              159KB

              MD5

              70f92610b1bd700ff472997dfecb689c

              SHA1

              ddac19bc8d97f9ac1d1c754b7193eac5f4b249f7

              SHA256

              bd30f98ffb8d8cfb4868253e51d5a5927aeb53ac4d9e431a4ba8fc3517a76423

              SHA512

              564003358a8fdb727838f5962af9c25cca1b5e7b8021e7e74babf14fc12d989414ff77f81918784fdf684cb8c19b82ffcacee3a0fa1e85001fc1ee6b614124bb

            • \Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe

              Filesize

              159KB

              MD5

              20eba9c267132c5ad4176942eddd274c

              SHA1

              823d233fb6a76bad935daf70d6b567b39c19f21a

              SHA256

              4dfba4f097d606e69c70c196010501269167b7634959a20079788db0f66f838d

              SHA512

              2218e8cdb3b1e609ebc6776546fd8d6192c5c65d8f0526bd78d2566f6cc9ce8fc3237291ec07f940662f012b73e01b152e60bcd8dc1f7026cd48713b139dc953

            • memory/1064-135-0x0000000001DA0000-0x0000000001DC7000-memory.dmp

              Filesize

              156KB

            • memory/1064-137-0x0000000001DA0000-0x0000000001DC7000-memory.dmp

              Filesize

              156KB

            • memory/1064-139-0x0000000001DA0000-0x0000000001DC7000-memory.dmp

              Filesize

              156KB

            • memory/1064-141-0x0000000001DA0000-0x0000000001DC7000-memory.dmp

              Filesize

              156KB

            • memory/1064-143-0x0000000001DA0000-0x0000000001DC7000-memory.dmp

              Filesize

              156KB

            • memory/1092-153-0x0000000001FB0000-0x0000000001FD7000-memory.dmp

              Filesize

              156KB

            • memory/1092-149-0x0000000001FB0000-0x0000000001FD7000-memory.dmp

              Filesize

              156KB

            • memory/1092-151-0x0000000001FB0000-0x0000000001FD7000-memory.dmp

              Filesize

              156KB

            • memory/1092-147-0x0000000001FB0000-0x0000000001FD7000-memory.dmp

              Filesize

              156KB

            • memory/1148-163-0x00000000021B0000-0x00000000021D7000-memory.dmp

              Filesize

              156KB

            • memory/1148-159-0x00000000021B0000-0x00000000021D7000-memory.dmp

              Filesize

              156KB

            • memory/1148-161-0x00000000021B0000-0x00000000021D7000-memory.dmp

              Filesize

              156KB

            • memory/1148-157-0x00000000021B0000-0x00000000021D7000-memory.dmp

              Filesize

              156KB

            • memory/1220-167-0x0000000001CA0000-0x0000000001CC7000-memory.dmp

              Filesize

              156KB

            • memory/1220-169-0x0000000001CA0000-0x0000000001CC7000-memory.dmp

              Filesize

              156KB

            • memory/1540-130-0x0000000000020000-0x0000000000033000-memory.dmp

              Filesize

              76KB

            • memory/1540-633-0x0000000000020000-0x0000000000033000-memory.dmp

              Filesize

              76KB

            • memory/1540-632-0x0000000000020000-0x0000000000033000-memory.dmp

              Filesize

              76KB

            • memory/1540-132-0x0000000000020000-0x0000000000033000-memory.dmp

              Filesize

              76KB

            • memory/1540-131-0x0000000000020000-0x0000000000033000-memory.dmp

              Filesize

              76KB

            • memory/2604-101-0x0000000000360000-0x0000000000373000-memory.dmp

              Filesize

              76KB

            • memory/2604-133-0x0000000000400000-0x0000000000590000-memory.dmp

              Filesize

              1.6MB

            • memory/2604-107-0x0000000000360000-0x0000000000373000-memory.dmp

              Filesize

              76KB

            • memory/2604-64-0x0000000000400000-0x0000000000590000-memory.dmp

              Filesize

              1.6MB

            • memory/2604-76-0x0000000000400000-0x0000000000590000-memory.dmp

              Filesize

              1.6MB

            • memory/2604-75-0x0000000000400000-0x0000000000590000-memory.dmp

              Filesize

              1.6MB

            • memory/2604-66-0x0000000000400000-0x0000000000590000-memory.dmp

              Filesize

              1.6MB

            • memory/2604-71-0x0000000000400000-0x0000000000590000-memory.dmp

              Filesize

              1.6MB

            • memory/2648-11-0x0000000000400000-0x0000000000418000-memory.dmp

              Filesize

              96KB

            • memory/2768-4-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2768-0-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2768-31-0x0000000002230000-0x0000000002243000-memory.dmp

              Filesize

              76KB

            • memory/2768-2-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2768-20-0x0000000002220000-0x0000000002233000-memory.dmp

              Filesize

              76KB

            • memory/2768-54-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2768-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2768-13-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2768-16-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2768-30-0x0000000002230000-0x0000000002243000-memory.dmp

              Filesize

              76KB

            • memory/2768-14-0x0000000000400000-0x000000000044E0A1-memory.dmp

              Filesize

              312KB

            • memory/2768-7-0x0000000000400000-0x000000000044F000-memory.dmp

              Filesize

              316KB

            • memory/2768-52-0x0000000000400000-0x000000000044E0A1-memory.dmp

              Filesize

              312KB

            • memory/2780-53-0x0000000000260000-0x0000000000263000-memory.dmp

              Filesize

              12KB

            • memory/2780-78-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/2780-33-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/2780-56-0x0000000000020000-0x0000000000033000-memory.dmp

              Filesize

              76KB

            • memory/2780-55-0x0000000000020000-0x0000000000033000-memory.dmp

              Filesize

              76KB

            • memory/2900-109-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/2900-123-0x0000000000400000-0x0000000000413000-memory.dmp

              Filesize

              76KB

            • memory/2900-118-0x0000000000740000-0x0000000000753000-memory.dmp

              Filesize

              76KB