Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 02:45

General

  • Target

    188153f381a3b62bad11dd2f6ea6b498_JaffaCakes118.exe

  • Size

    302KB

  • MD5

    188153f381a3b62bad11dd2f6ea6b498

  • SHA1

    1468ddf7ad4464c787e216bf3a2f6a8f9e454778

  • SHA256

    568bb20f086c3b66c94ac2bdc7bff91d5452d118aebe74d81dfdd70633e6ab50

  • SHA512

    4dd529ba660261eedc5a152dd7cca11a2033440579f273f1edea2ff2ac882b8e6d6962450e29d702ff0e91725f8d407cb8d3d7db2b3b6139737b49f248726686

  • SSDEEP

    6144:3q3W2JBfvGQopEnL3L+Z4i14RjzgKQQI697orKOYwUiJ+KRH0NNe3:6NopoLKZx1U9QssrswUYRHye3

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\188153f381a3b62bad11dd2f6ea6b498_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\188153f381a3b62bad11dd2f6ea6b498_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\188153f381a3b62bad11dd2f6ea6b498_JaffaCakes118.exe"
      2⤵
        PID:5780
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k network
      1⤵
      • Loads dropped DLL
      PID:4712

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Server Software Component

    1
    T1505

    Terminal Services DLL

    1
    T1505.005

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\plugin\001.dll
      Filesize

      19KB

      MD5

      279ddab68e523c810d457eebda80a8ad

      SHA1

      596b4ccd79c548d05346fd2c22a6a8d8eddc13af

      SHA256

      1d316b0a0d0b607e61f7ec6d4336855a0fd229733c90ba6baed5fd3b847628e8

      SHA512

      5281706afe3d0859770ba458ec083fd5abf4c78b62ef68bd8d8bf6b846d50f1f4c017f81898b71ebfd731d938c8f5e742dd08dec62df29b305ac13c051dbf2f9

    • \??\c:\windows\SysWOW64\sysns.dll
      Filesize

      475KB

      MD5

      813a5af74a429a664eaa2623eaa3b390

      SHA1

      71db501ac359ac462e3af5419b888dc43b58a9f9

      SHA256

      51b0294a20a1e958bab85e607e5500bb4bea26fe4f41846851befc4d54f3e93f

      SHA512

      66a547b4db3a6c270fa3adb4b0f089544ebcd93ad56e10822d959e9a7630b1c573ed040185b401195a6e6da9349f7bf390768bb0b132bc3f4c52f76a7899a259

    • memory/2372-0-0x0000000013140000-0x0000000013222000-memory.dmp
      Filesize

      904KB

    • memory/2372-2-0x00000000131D5000-0x0000000013221000-memory.dmp
      Filesize

      304KB

    • memory/2372-1-0x0000000013140000-0x0000000013222000-memory.dmp
      Filesize

      904KB

    • memory/2372-11-0x0000000013140000-0x0000000013222000-memory.dmp
      Filesize

      904KB

    • memory/2372-10-0x00000000131D5000-0x0000000013221000-memory.dmp
      Filesize

      304KB

    • memory/4712-16-0x00000000017E0000-0x00000000017EB000-memory.dmp
      Filesize

      44KB

    • memory/4712-15-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/4712-17-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB