Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 10:41

General

  • Target

    19d1b91ef29c24381721b9ebbf4af89e_JaffaCakes118.exe

  • Size

    223KB

  • MD5

    19d1b91ef29c24381721b9ebbf4af89e

  • SHA1

    61986c04e63dcda4716c3f0e0b8b880eb4bde687

  • SHA256

    acc8873a23ff9a6a2b234faf2faea7e42c690277f6fdbc45b31ebab4a383e08a

  • SHA512

    745f1d8feb8540ef1d17eaa8df920517bdcd7e36db4d318d691bc5550926089acb8c43a1603a2b4acb7d434de998dfaca3e151af20efd10110f885f10a229a85

  • SSDEEP

    6144:TebAeX4/K5RthYZl1OmdqcTnixNjpTAoS1:TuI/IwlzdqpxJ+oS1

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 19 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19d1b91ef29c24381721b9ebbf4af89e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\19d1b91ef29c24381721b9ebbf4af89e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\SysWOW64\wins\setup\msmgrs.exe
      "C:\Windows\system32\wins\setup\msmgrs.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\debugger.dll
    Filesize

    42KB

    MD5

    7029327a8dfda9b714757b6c8873c7ab

    SHA1

    0f83ef6252eccd14c766315fe3e108acf35a1bff

    SHA256

    049f406bacad7a93ce40d6315ca4d50d1e7f2033809c5f252fb6bfce20169648

    SHA512

    45c55387afdcad8e34917210c0e6320ef5978d56b385b7b2c5f39963c054e5b71c19928954ea09fce49444fe998265232ab35ce4f28d8eafbcb9d014ac6d7070

  • C:\Windows\SysWOW64\wins\setup\msmgrs.exe
    Filesize

    223KB

    MD5

    19d1b91ef29c24381721b9ebbf4af89e

    SHA1

    61986c04e63dcda4716c3f0e0b8b880eb4bde687

    SHA256

    acc8873a23ff9a6a2b234faf2faea7e42c690277f6fdbc45b31ebab4a383e08a

    SHA512

    745f1d8feb8540ef1d17eaa8df920517bdcd7e36db4d318d691bc5550926089acb8c43a1603a2b4acb7d434de998dfaca3e151af20efd10110f885f10a229a85

  • memory/2748-32-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-53-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-55-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-34-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-19-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-51-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-28-0x0000000000740000-0x0000000000741000-memory.dmp
    Filesize

    4KB

  • memory/2748-29-0x0000000000760000-0x0000000000780000-memory.dmp
    Filesize

    128KB

  • memory/2748-30-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-31-0x0000000000760000-0x0000000000780000-memory.dmp
    Filesize

    128KB

  • memory/2748-57-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-49-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-39-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-37-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-35-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-41-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-43-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-45-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/2748-47-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/5036-9-0x0000000000670000-0x0000000000690000-memory.dmp
    Filesize

    128KB

  • memory/5036-21-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB

  • memory/5036-1-0x0000000000650000-0x0000000000651000-memory.dmp
    Filesize

    4KB

  • memory/5036-8-0x0000000000670000-0x0000000000690000-memory.dmp
    Filesize

    128KB

  • memory/5036-0-0x0000000000400000-0x000000000048D000-memory.dmp
    Filesize

    564KB