Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 05:30

General

  • Target

    fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe

  • Size

    365KB

  • MD5

    fa4a3f11a4f6dec0995b6d08692a175f

  • SHA1

    61a13d2666b99c623976d5dede5a8cbbedc88059

  • SHA256

    d7c6d8cc6dbe2fb4072756b4c58427303ad62e044e2b9142fdcd3f2dac61f31d

  • SHA512

    311c31a70a52899ce9225ea9a4ef475126dc2becfab3be87e3711e163578e9dceb6cd5466f8553165fe9a59281b0fd464814e601b4616dc6b9a6be7aa26ac4b7

  • SSDEEP

    6144:B/0uoDXyB5M+4MMLJI0IcaVY8ijYMi9rWYKQc8OA8FNuw/g4Pwkn5vjOL:BJgip4nK1pHiYHhKQSZJ1Pwkn5vjk

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • VMProtect packed file 10 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 292
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 292
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE

    Filesize

    315KB

    MD5

    27fab6fe7a175f7c0d13ecf7068b1ca7

    SHA1

    b08ac1a5fa5a4e1443f0c01cc7e89849e58becf4

    SHA256

    74ae32b83b999b4489ac1df26df600ac5ae1d8c7834d738fb1343d04254f84ab

    SHA512

    f5f29bc21ab98bf4c9a282af34578cfa60b0ad1796a1428b2ee84ff4c6c4b08d63865de380c2b2386982a570777f87ef1719d57cab63c65dff4de1ec044dbb74

  • memory/740-20-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/740-10-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/740-14-0x00000000004CC000-0x00000000004CD000-memory.dmp

    Filesize

    4KB

  • memory/740-13-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/740-15-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/2524-9-0x0000000002460000-0x000000000257D000-memory.dmp

    Filesize

    1.1MB

  • memory/2524-22-0x0000000002460000-0x000000000257D000-memory.dmp

    Filesize

    1.1MB

  • memory/2852-28-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/2852-27-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/2852-25-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/2852-29-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB

  • memory/2852-34-0x0000000000400000-0x000000000051D000-memory.dmp

    Filesize

    1.1MB