Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 10:41

General

  • Target

    19d1b91ef29c24381721b9ebbf4af89e_JaffaCakes118.exe

  • Size

    223KB

  • MD5

    19d1b91ef29c24381721b9ebbf4af89e

  • SHA1

    61986c04e63dcda4716c3f0e0b8b880eb4bde687

  • SHA256

    acc8873a23ff9a6a2b234faf2faea7e42c690277f6fdbc45b31ebab4a383e08a

  • SHA512

    745f1d8feb8540ef1d17eaa8df920517bdcd7e36db4d318d691bc5550926089acb8c43a1603a2b4acb7d434de998dfaca3e151af20efd10110f885f10a229a85

  • SSDEEP

    6144:TebAeX4/K5RthYZl1OmdqcTnixNjpTAoS1:TuI/IwlzdqpxJ+oS1

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 15 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19d1b91ef29c24381721b9ebbf4af89e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19d1b91ef29c24381721b9ebbf4af89e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\SysWOW64\wins\setup\msmgrs.exe
      "C:\Windows\system32\wins\setup\msmgrs.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:2712

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\debugger.dll
    Filesize

    42KB

    MD5

    7029327a8dfda9b714757b6c8873c7ab

    SHA1

    0f83ef6252eccd14c766315fe3e108acf35a1bff

    SHA256

    049f406bacad7a93ce40d6315ca4d50d1e7f2033809c5f252fb6bfce20169648

    SHA512

    45c55387afdcad8e34917210c0e6320ef5978d56b385b7b2c5f39963c054e5b71c19928954ea09fce49444fe998265232ab35ce4f28d8eafbcb9d014ac6d7070

  • \Windows\SysWOW64\wins\setup\msmgrs.exe
    Filesize

    223KB

    MD5

    19d1b91ef29c24381721b9ebbf4af89e

    SHA1

    61986c04e63dcda4716c3f0e0b8b880eb4bde687

    SHA256

    acc8873a23ff9a6a2b234faf2faea7e42c690277f6fdbc45b31ebab4a383e08a

    SHA512

    745f1d8feb8540ef1d17eaa8df920517bdcd7e36db4d318d691bc5550926089acb8c43a1603a2b4acb7d434de998dfaca3e151af20efd10110f885f10a229a85

  • memory/1660-0-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/1660-1-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/1660-5-0x00000000002A0000-0x00000000002C0000-memory.dmp
    Filesize

    128KB

  • memory/1660-15-0x0000000003A10000-0x0000000003A9D000-memory.dmp
    Filesize

    564KB

  • memory/1660-18-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-25-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-39-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-24-0x0000000000270000-0x0000000000290000-memory.dmp
    Filesize

    128KB

  • memory/2712-19-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-26-0x0000000000270000-0x0000000000290000-memory.dmp
    Filesize

    128KB

  • memory/2712-35-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-37-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-21-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/2712-41-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-43-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-45-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-47-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-49-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-51-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2712-53-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB