Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 10:51
Behavioral task
behavioral1
Sample
da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe
-
Size
91KB
-
MD5
da2ec702e12bfa2256dc9ee50712968b
-
SHA1
b10017a79e7e7cef74b6ce0f500c90d3306d9eeb
-
SHA256
54c7f8d584658344fc57cf30b886361cd008a2937a957917d42cc67d68120d41
-
SHA512
df7db037831d7af269f1fbb19fda5f0ebf0d5d56c448a358c1dae8871cdcacc7e7b6c96a9c7c01300268b7587650a367beab7274e005b0adcd72971342ce912a
-
SSDEEP
1536:q1qkE/MD5yMkhMwOnbNQKLjWDyy1o5I0pJUEbooPRrKKRSqBXPA:QndxNQKPWDyDI0pJltZrpRS0X4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2124-4-0x0000000010000000-0x000000001001E000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2124 set thread context of 348 2124 da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2124 wrote to memory of 348 2124 da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe 30 PID 2124 wrote to memory of 348 2124 da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe 30 PID 2124 wrote to memory of 348 2124 da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe 30 PID 2124 wrote to memory of 348 2124 da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe 30 PID 2124 wrote to memory of 348 2124 da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe 30 PID 2124 wrote to memory of 348 2124 da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\da2ec702e12bfa2256dc9ee50712968b_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:348
-