Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 06:22
Behavioral task
behavioral1
Sample
d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe
-
Size
105KB
-
MD5
d9c676246414b5c1211ce337b1e332b7
-
SHA1
64147ef6ed8c70fd5ceb25b194573c0f5729f8bf
-
SHA256
603e2b74c02fc34942f234a2e600be53d828698f0fce8ced123c0a9570568758
-
SHA512
c33a18447c7b46b1f06b4d4757e2e7e2e618f10ece3278395fd7c471f7d29d38892037c4d8002f94c090eb304b830b4db11177eebb940bc07d1904a6a58c3650
-
SSDEEP
1536:XCGcRjbb53/KCY3L3RiAfLiZaK+QGY50I1HUMFyq6DmF9HRKw+gj:cl3/VefLibrP1H5yTC1RKCj
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2412-7-0x0000000000400000-0x0000000000421000-memory.dmp modiloader_stage2 behavioral1/files/0x0008000000016dd8-5.dat modiloader_stage2 behavioral1/memory/2352-17-0x0000000010000000-0x000000001000C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2352 Systemloader.exe 2340 Systemloader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2352 set thread context of 2340 2352 Systemloader.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Systemloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2352 2412 d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2352 2412 d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2352 2412 d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe 29 PID 2412 wrote to memory of 2352 2412 d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe 29 PID 2352 wrote to memory of 2340 2352 Systemloader.exe 30 PID 2352 wrote to memory of 2340 2352 Systemloader.exe 30 PID 2352 wrote to memory of 2340 2352 Systemloader.exe 30 PID 2352 wrote to memory of 2340 2352 Systemloader.exe 30 PID 2352 wrote to memory of 2340 2352 Systemloader.exe 30 PID 2352 wrote to memory of 2340 2352 Systemloader.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9c676246414b5c1211ce337b1e332b7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Systemloader.exe"C:\Systemloader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Systemloader.exeC:\Systemloader.exe3⤵
- Executes dropped EXE
PID:2340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5833248cd02b0c578feb069acc66e9d6e
SHA138fd8010f55be6012f3eef353ad4d5c44f7a9080
SHA256ed2b5f400ca4863ebed24194fb81d47282d0be0877f23e84a197d9b748e0c49e
SHA512087f9a77b2fc879c873d4d6392990104831f3e53827299dec917b17dc036def68551a867b36b2b88eddae1748df0447e65e0628082824349e4fe703b967acc0f
-
Filesize
22KB
MD51b58ac36575d9c69123aaba7aef86e8a
SHA121146726066641d70a3f800d339b428f8042f714
SHA256b632e67b6e4b6c417c3e39e1c15ca2762158a01e81a3e5e1157ec6acd379779f
SHA512503ab01530714abf076f786e397e14b0c08e31fe3e3bcb6a0e38c2c767e65cb5c5755f131c426ce290a7bfe73876a3c36225da258db2ca4a5dc583d4aca0af6e