Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
-
Size
384KB
-
MD5
d47eca1186bd3387a4704bf79b9a465e
-
SHA1
7c78087f20e63ea427527788e7031b9db4a8f022
-
SHA256
31e58a5ffe24c8043ecd08816a14a68bfc6b913e8dd2ebc269d9b1fa38c24b4c
-
SHA512
a57517bd3ad539b0e80760fb01ba4b8afb4943bbf282dab458165817e16e5532b757617b7a97c178b2e7655d1e1d65d5ee73ddba8aaf3650f6a0c58a06e0decf
-
SSDEEP
6144:bcTx2F2idZecnl20lHRxp3gFVuYsQ5cOdeRb8iY91EEVKYVAaMB:bcT0F3Z4mxxk7sIcOa/Y91TVK99B
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3132-96-0x0000000003490000-0x00000000034B4000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3132 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c3fd9a35b0694328ff28ad9aaa01544c
SHA1ae094353606ec2f5316fee291c61d673ac259dcb
SHA256d8fc255f69f962a44978be1713f1555a17ea7006c3ccaa14c6dc379b7e7eedc6
SHA5126c3837934ea2edbc3382ad26044676b576068685b3013b4622d1a643210c590b55b0717ff2ee15270e3ee80410438d2e6dc3e0eb649b2d1bcd24037c6b40f4f8