Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 08:44

General

  • Target

    JaffaCakes118_0c10419d0b6e63120b280eeffe4ee42c.exe

  • Size

    618KB

  • MD5

    0c10419d0b6e63120b280eeffe4ee42c

  • SHA1

    39d02fb90f08b647efefc682e353d0a44271fe89

  • SHA256

    fc3759a4688531b6f0dee2720c75d047ffe871d8bf673be266b13a2f453c9105

  • SHA512

    93f156514f068f2a445542614f8db5c5aa4c3c2d89e826cc6166244ceea0a3b145ee41f60b0f568ae1782f823c2142d294d6da1f95be1cac425cadc37d6687c5

  • SSDEEP

    12288:NnEXp6gxVV/WDpD0Ws997X5uQmvESXhYyI/lf1c2obY7Gr3IIZD:N8d/WdD0YQm9hYyIZocqr35ZD

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c10419d0b6e63120b280eeffe4ee42c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c10419d0b6e63120b280eeffe4ee42c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BAU_UP~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BAU_UP~1.EXE
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
          PID:2672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\BAU_UP~1.EXE

      Filesize

      688KB

      MD5

      a14352085bdaefa177ebed1fb7db8278

      SHA1

      5003d0a22e1b74086923d77c44fbbec1d7ad2ff2

      SHA256

      de88694337500158d7093d3ddd098dafd39363a1800e02f65e8fbfafd16c21f4

      SHA512

      235e809d1b45607f62d6fd3be553d5c6838ea5eb025d73c8ada75154e405acde40e4a663e1a7be499412d95910545ecfaeb01e1b2bb6adc0d445e038424d966e

    • memory/1716-0-0x0000000001000000-0x00000000010FC000-memory.dmp

      Filesize

      1008KB

    • memory/1716-1-0x00000000001B0000-0x0000000000200000-memory.dmp

      Filesize

      320KB

    • memory/1716-7-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/1716-9-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-8-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/1716-6-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/1716-5-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/1716-4-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/1716-3-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/1716-2-0x00000000002D0000-0x00000000002D1000-memory.dmp

      Filesize

      4KB

    • memory/1716-25-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-51-0x0000000000620000-0x0000000000621000-memory.dmp

      Filesize

      4KB

    • memory/1716-50-0x0000000000980000-0x0000000000981000-memory.dmp

      Filesize

      4KB

    • memory/1716-49-0x0000000000970000-0x0000000000971000-memory.dmp

      Filesize

      4KB

    • memory/1716-48-0x0000000000960000-0x0000000000961000-memory.dmp

      Filesize

      4KB

    • memory/1716-47-0x00000000005F0000-0x00000000005F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-46-0x0000000000600000-0x0000000000601000-memory.dmp

      Filesize

      4KB

    • memory/1716-45-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-44-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-43-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-42-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-41-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-40-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-39-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-38-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-37-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-36-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-35-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-34-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-33-0x0000000000320000-0x0000000000321000-memory.dmp

      Filesize

      4KB

    • memory/1716-32-0x00000000003A0000-0x00000000003A1000-memory.dmp

      Filesize

      4KB

    • memory/1716-31-0x00000000005D0000-0x00000000005D1000-memory.dmp

      Filesize

      4KB

    • memory/1716-30-0x0000000000390000-0x0000000000391000-memory.dmp

      Filesize

      4KB

    • memory/1716-29-0x0000000000380000-0x0000000000381000-memory.dmp

      Filesize

      4KB

    • memory/1716-28-0x0000000000300000-0x0000000000301000-memory.dmp

      Filesize

      4KB

    • memory/1716-27-0x0000000000310000-0x0000000000311000-memory.dmp

      Filesize

      4KB

    • memory/1716-26-0x00000000005C0000-0x00000000005C1000-memory.dmp

      Filesize

      4KB

    • memory/1716-24-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-23-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-22-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-21-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-20-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-19-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-18-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-17-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-16-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-15-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-14-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-13-0x00000000029F0000-0x00000000029F1000-memory.dmp

      Filesize

      4KB

    • memory/1716-12-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-11-0x0000000000200000-0x0000000000201000-memory.dmp

      Filesize

      4KB

    • memory/1716-10-0x0000000002A00000-0x0000000002A01000-memory.dmp

      Filesize

      4KB

    • memory/1716-70-0x0000000001000000-0x00000000010FC000-memory.dmp

      Filesize

      1008KB

    • memory/1716-69-0x00000000001B0000-0x0000000000200000-memory.dmp

      Filesize

      320KB

    • memory/1800-67-0x0000000000400000-0x00000000004BD000-memory.dmp

      Filesize

      756KB

    • memory/2672-63-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2672-66-0x0000000000400000-0x00000000004BD000-memory.dmp

      Filesize

      756KB

    • memory/2672-64-0x0000000000400000-0x00000000004BD000-memory.dmp

      Filesize

      756KB