Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-01-2025 23:01

General

  • Target

    JaffaCakes118_0831adb69ea33039dde9f4360c54e0f1.exe

  • Size

    1.3MB

  • MD5

    0831adb69ea33039dde9f4360c54e0f1

  • SHA1

    3e69c058193c497ce2545c0d2eb9b697f1fa8016

  • SHA256

    21cc65db009a83b81359d379cad06d2459ca5f5895a43af329a2d81ae2e6b560

  • SHA512

    77ab314bf23704226398eb8c4d482531af42e94467809139240052e2fa50c29ab675fc6bbaac8ee97894fead25caf7eac1fdeb7905d6bd06f9a7c12dac15f00b

  • SSDEEP

    24576:KmdtnYWyUnHnqP55sNU4BTIjT0/HEKQ2INw/DOV7THHqg9Zi2kYkpZAX:Kmo5H14BTIjT0/HEuKNHNQY8Z

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0831adb69ea33039dde9f4360c54e0f1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0831adb69ea33039dde9f4360c54e0f1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 580
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2820
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\048.jpg

    Filesize

    470KB

    MD5

    c9b010b61163a37424b0f1e4bfc2dd4a

    SHA1

    a14f5f71c9a4de9a8276842aeec79c95beeab57c

    SHA256

    a6803aa32ca47fe139ee7b78394bf4b4785e621d754f9a381538cbca6298b135

    SHA512

    6d4aeaaab88afffdadc1f15188c15a3946c564aa671084a75c2ae68753dd7932b52af5b19372124f32dc7cbd18e081ef2782ca482a004c14b861a6a74619851b

  • \Users\Admin\AppData\Local\Temp\2.exe

    Filesize

    540KB

    MD5

    e32f7cc44f7c6b371fa31f667b50bd0a

    SHA1

    629d7ced9204b1c9cb5fa0a9de32a1d1129f9091

    SHA256

    14629cebe35debdf81d509120ae6054d10d2db56d9edf3da414fd9ff8c0cd2f4

    SHA512

    ff096f823aba8a8e2da0c81e4ac1f5dffdf3495912e286e973bbb85bc8b95b2b335508db405ef1b1c5b1f4fc2beb2ca29fef3692b4c98ba2eed54f44263e6c2e

  • memory/2384-8-0x0000000002180000-0x00000000021C0000-memory.dmp

    Filesize

    256KB

  • memory/2384-12-0x0000000002180000-0x00000000021C0000-memory.dmp

    Filesize

    256KB

  • memory/2640-9-0x0000000000650000-0x0000000000652000-memory.dmp

    Filesize

    8KB

  • memory/2640-11-0x0000000000400000-0x000000000054F000-memory.dmp

    Filesize

    1.3MB

  • memory/2772-10-0x00000000001F0000-0x00000000001F2000-memory.dmp

    Filesize

    8KB