Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:28
Behavioral task
behavioral1
Sample
daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll
-
Size
331KB
-
MD5
daa6fc9ce47213d49ba91a8b78a80757
-
SHA1
f59089791f289f0d2ec3b5729ef46827f4fa6d41
-
SHA256
87422011d60613bf2f591057dd05fea2b896d56c5781b1875f1728b471b9d549
-
SHA512
9a716152086a13d1c2e6ad16d35304e9260cec4982b7220d5a6ed41694fbddfa87c050892604141e6e7c4016af0761781e308787d14aa9ff31a80d4d8b270157
-
SSDEEP
6144:cCFNcE5fx1TYK4xkv/BugEm4QrxcTq670nCGQktzJwZkiZalKRDw9:9NcE5fT54xkv/B34Qi240SktzJbipG9
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2528-13-0x0000000000400000-0x0000000000457000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 1176 2440 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Notepad.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2528 2936 rundll32.exe 30 PID 2936 wrote to memory of 2528 2936 rundll32.exe 30 PID 2936 wrote to memory of 2528 2936 rundll32.exe 30 PID 2936 wrote to memory of 2528 2936 rundll32.exe 30 PID 2936 wrote to memory of 2528 2936 rundll32.exe 30 PID 2936 wrote to memory of 2528 2936 rundll32.exe 30 PID 2936 wrote to memory of 2528 2936 rundll32.exe 30 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2528 wrote to memory of 2440 2528 rundll32.exe 31 PID 2440 wrote to memory of 1176 2440 Notepad.exe 32 PID 2440 wrote to memory of 1176 2440 Notepad.exe 32 PID 2440 wrote to memory of 1176 2440 Notepad.exe 32 PID 2440 wrote to memory of 1176 2440 Notepad.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daa6fc9ce47213d49ba91a8b78a80757_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\Notepad.exe"C:\Windows\System32\Notepad.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 1964⤵
- Program crash
PID:1176
-
-
-