Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 06:36

General

  • Target

    JaffaCakes118_0b327b88f123510e6b50df100ee9f50b.exe

  • Size

    510KB

  • MD5

    0b327b88f123510e6b50df100ee9f50b

  • SHA1

    612c7ed5452daf9db949093dcdf5fdef25132412

  • SHA256

    15a8b3b9f7b50efb9922d132759d2d3fea482074c5c7acc774d3a6a053a11c89

  • SHA512

    01c5fda274bb104c7b774098dfa2e34ff77831067893e0144ba7bf750f84e107f83da4d5091f73b98b4ec54c5d2148299a8c6d49c00710015f3b5d19c4cf703f

  • SSDEEP

    12288:Gg+mzUMDRUTV5nKHihTJd7BkcQc4yb28PnxcpNVVqgWxuxLA:G1/ZTV5n8ir7kcp4x6cpN/WxaLA

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b327b88f123510e6b50df100ee9f50b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0b327b88f123510e6b50df100ee9f50b.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\s.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3544
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c kb
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\kb.exe
          kb
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1392
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c kk.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3620
        • C:\kk.exe
          kk.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1468
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 536
            5⤵
            • Program crash
            PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c del kb.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2128
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c del k.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5048
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c del s.vbs
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1468 -ip 1468
    1⤵
      PID:3636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\kb.exe

      Filesize

      51KB

      MD5

      4665d7a9c72f59046c4b1513b19d4e15

      SHA1

      0bdfedde3ec7a10936ce6202ae3e81b03f1b2b5e

      SHA256

      31e384fe60859e455eddd5b603b4aec8020724b43d1a0a32218a75f77e281833

      SHA512

      ef4100b05190fedcbd777669ef2415f39adace40d418d93e19a75959f68553974e9bf3011c07ee37b7346ae059e4e73b0cc795d4305c5f17662769891347d54a

    • C:\kk.exe

      Filesize

      680KB

      MD5

      7772fb976ceb942e8fb8639bc93261ef

      SHA1

      c29fe0b3c0fe88acb3de01f020b19aa3e0b22f07

      SHA256

      125438081c49842f4e226e979c38a7da5780d43ad410b064fc3ab8c731400680

      SHA512

      a6645660657d9ca5768a5a6a4aa423269fba0160169efedac28156101991294688ff9ffc1195c122221fc335afcf36beef8087f90e2f36824c55114d6f1119e1

    • C:\s.vbs

      Filesize

      198B

      MD5

      0106cd0e268e3234cd2b3567b2f30d75

      SHA1

      01f9134f8ad1693aadff6df1bab7718b875aa15a

      SHA256

      e84d10954519e536322c9c0dd8e3ae01c9ae05744b18221bb7eadfe8d7b6967d

      SHA512

      8637f3abb04d8f1cd5ea65d0bf8cefe61ecf7f37c34901f5292a87a612285f03dac713f6d1f268b7c5bb65bf5fe3e6816b12892c4d528133afd22e7ba2eca42e

    • memory/1468-14-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/1468-17-0x0000000000400000-0x00000000004BB000-memory.dmp

      Filesize

      748KB

    • memory/2064-16-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB