Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 05:47
Behavioral task
behavioral1
Sample
e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll
-
Size
130KB
-
MD5
e1d206169fb174f1387f3aa12f7022ab
-
SHA1
93f2753149c19456a6aa7e323e36cfa3510487ba
-
SHA256
f7ce5446f1bd519c0bfd07ff6f0c0f27346f1dddd0faeb96ed693fba560d9877
-
SHA512
7c7b690c6c8a77cae06cac4f94d4490c83bc5d9c76aeda850fe7bba283ff3d18bbac3cea0d0f4e4caaae362d43165dca374f4582a4b3f3e3d08c59dbf78d69cd
-
SSDEEP
3072:H7KsteHl4EUVeyH8alDP08P3LV7a6q8Q0yUMIBgtFlrQIsp:HuTWxVfceDD3L03IitFlre
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/2872-1-0x0000000000400000-0x000000000044D000-memory.dmp modiloader_stage2 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\0.idx rundll32.exe File created C:\Windows\1.idx rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3892 2872 WerFault.exe 83 804 2872 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4724 wrote to memory of 2872 4724 rundll32.exe 83 PID 4724 wrote to memory of 2872 4724 rundll32.exe 83 PID 4724 wrote to memory of 2872 4724 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll,#12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 7243⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 9483⤵
- Program crash
PID:804
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2872 -ip 28721⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2872 -ip 28721⤵PID:2424