Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:41
Behavioral task
behavioral1
Sample
d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll
-
Size
34KB
-
MD5
d329f6855eee22d331187c119918ab2d
-
SHA1
bb8a4df212d3d471670ac1a5b0c48de7630c7197
-
SHA256
d10842d8c3ce0b16566bfc7ed6b7db3924b735c8e90faac55650705134c27e2b
-
SHA512
31d9bf3f390cbf3aef85441f1da53703c240da044e2ca378cf2c356757329c62cdeebf205b562df6044dfcdad2fc2b997dc5c16a2488c9b9a3c44a57b34f7946
-
SSDEEP
768:Yoi4qZOLQNwdXcBq5OpBlaKr91EPFME3ryYdR4ftI9QuV:Yv4qZyQNwdcUOpBlaO1oMsrNUuV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/964-0-0x00000000001B0000-0x00000000001BD000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 4 IoCs
flow pid Process 5 964 rundll32.exe 4 964 rundll32.exe 6 964 rundll32.exe 7 964 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\instalflash.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\instalflash.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1756 wrote to memory of 964 1756 rundll32.exe 30 PID 1756 wrote to memory of 964 1756 rundll32.exe 30 PID 1756 wrote to memory of 964 1756 rundll32.exe 30 PID 1756 wrote to memory of 964 1756 rundll32.exe 30 PID 1756 wrote to memory of 964 1756 rundll32.exe 30 PID 1756 wrote to memory of 964 1756 rundll32.exe 30 PID 1756 wrote to memory of 964 1756 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d329f6855eee22d331187c119918ab2d_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:964
-