Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2024 05:47

General

  • Target

    e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll

  • Size

    130KB

  • MD5

    e1d206169fb174f1387f3aa12f7022ab

  • SHA1

    93f2753149c19456a6aa7e323e36cfa3510487ba

  • SHA256

    f7ce5446f1bd519c0bfd07ff6f0c0f27346f1dddd0faeb96ed693fba560d9877

  • SHA512

    7c7b690c6c8a77cae06cac4f94d4490c83bc5d9c76aeda850fe7bba283ff3d18bbac3cea0d0f4e4caaae362d43165dca374f4582a4b3f3e3d08c59dbf78d69cd

  • SSDEEP

    3072:H7KsteHl4EUVeyH8alDP08P3LV7a6q8Q0yUMIBgtFlrQIsp:HuTWxVfceDD3L03IitFlre

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e1d206169fb174f1387f3aa12f7022ab_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 724
        3⤵
        • Program crash
        PID:3892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 948
        3⤵
        • Program crash
        PID:804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2872 -ip 2872
    1⤵
      PID:2588
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2872 -ip 2872
      1⤵
        PID:2424

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2872-1-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB