Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2025, 12:47

General

  • Target

    JaffaCakes118_297aeaaeb26ed89a70a75ffddca1057a.exe

  • Size

    1.2MB

  • MD5

    297aeaaeb26ed89a70a75ffddca1057a

  • SHA1

    fcf9ae735d8a9bb046df8ef23086e547fddc26ca

  • SHA256

    4f39b10f4ef228661cd314dbdf11324eb8ad47b35bb34a082c26dc21a117d93d

  • SHA512

    f3cf59ac4812a54e7518f83ef329870af9079c7d19d5df69e62f0df64c5345a17915cd05b213fb33cae5b802c5468f99b45f7d51e85493bb8c3e3a2275733e2a

  • SSDEEP

    24576:Sk+OgUTB5Gu+X/s3qeG4KUchcN2PRm6Q3TM5V9:LgnnUDgh0wbATOV9

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_297aeaaeb26ed89a70a75ffddca1057a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_297aeaaeb26ed89a70a75ffddca1057a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp³õʼ»¯.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im IEXPLORE.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2744
    • C:\Users\Admin\AppData\Local\Tempqq.exe
      C:\Users\Admin\AppData\Local\Tempqq.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
          PID:2596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp³õʼ»¯.bat

      Filesize

      28B

      MD5

      0fcc0d97f7b549c9220f1326c587dcb8

      SHA1

      80dd7fa69c19105f0d7def0a343b4c249f4ab458

      SHA256

      65d1ad77377025ab49b917d6911f13f1110e52e2974f3008d60374897919cc29

      SHA512

      6efb8503c9b531c0f610faa8247108cb9490203638410828c55b1f7b361210ac83fef7d12023e5fc00253c35d2bcee3a175af8cf6f6d4af67d29d5e89b7de751

    • \Users\Admin\AppData\Local\Tempqq.exe

      Filesize

      685KB

      MD5

      86b914a1b61e2b3b2c008f1c9a760b0c

      SHA1

      ba5ff177260e1bc587870339eae01162cfe98a06

      SHA256

      41ae5681abbf84365e96b95f585473630ca3db432b29e9595841cfe2c674d593

      SHA512

      944e43c5692bf15c97491889a5d4cb5f9d6a2b6800c61139a4898d286ec28b6120b385ca85d6ff70f025d2e242c0dfe1d654cc0a7f2afabf21d4390464c74df3

    • memory/2756-13-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/2756-16-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB