Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 05:30

General

  • Target

    fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe

  • Size

    365KB

  • MD5

    fa4a3f11a4f6dec0995b6d08692a175f

  • SHA1

    61a13d2666b99c623976d5dede5a8cbbedc88059

  • SHA256

    d7c6d8cc6dbe2fb4072756b4c58427303ad62e044e2b9142fdcd3f2dac61f31d

  • SHA512

    311c31a70a52899ce9225ea9a4ef475126dc2becfab3be87e3711e163578e9dceb6cd5466f8553165fe9a59281b0fd464814e601b4616dc6b9a6be7aa26ac4b7

  • SSDEEP

    6144:B/0uoDXyB5M+4MMLJI0IcaVY8ijYMi9rWYKQc8OA8FNuw/g4Pwkn5vjOL:BJgip4nK1pHiYHhKQSZJ1Pwkn5vjk

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 2 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa4a3f11a4f6dec0995b6d08692a175f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 644
        3⤵
        • Program crash
        PID:1580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 664
        3⤵
        • Program crash
        PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 636
        3⤵
        • Program crash
        PID:1460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 640
        3⤵
        • Program crash
        PID:2648
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4780 -ip 4780
    1⤵
      PID:5112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4780 -ip 4780
      1⤵
        PID:1528
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2356 -ip 2356
        1⤵
          PID:1500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2356 -ip 2356
          1⤵
            PID:2268

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE

            Filesize

            315KB

            MD5

            27fab6fe7a175f7c0d13ecf7068b1ca7

            SHA1

            b08ac1a5fa5a4e1443f0c01cc7e89849e58becf4

            SHA256

            74ae32b83b999b4489ac1df26df600ac5ae1d8c7834d738fb1343d04254f84ab

            SHA512

            f5f29bc21ab98bf4c9a282af34578cfa60b0ad1796a1428b2ee84ff4c6c4b08d63865de380c2b2386982a570777f87ef1719d57cab63c65dff4de1ec044dbb74

          • memory/2356-10-0x0000000000400000-0x000000000051D000-memory.dmp

            Filesize

            1.1MB

          • memory/2356-11-0x0000000000400000-0x000000000051D000-memory.dmp

            Filesize

            1.1MB

          • memory/4780-4-0x0000000000400000-0x000000000051D000-memory.dmp

            Filesize

            1.1MB

          • memory/4780-6-0x00000000006E0000-0x00000000006E1000-memory.dmp

            Filesize

            4KB

          • memory/4780-7-0x0000000000400000-0x000000000051D000-memory.dmp

            Filesize

            1.1MB

          • memory/4780-8-0x0000000000400000-0x000000000051D000-memory.dmp

            Filesize

            1.1MB