Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
e24ccfd7376d5e82dc9b73edcfdeb826_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e24ccfd7376d5e82dc9b73edcfdeb826_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e24ccfd7376d5e82dc9b73edcfdeb826_JaffaCakes118.dll
-
Size
22KB
-
MD5
e24ccfd7376d5e82dc9b73edcfdeb826
-
SHA1
23fd1bf1a940dc267f29790a4f0362ac2dedfe0c
-
SHA256
5d3fd6168ca896715c22dbb8cb55d6d19e472085eddcbdeb5d5a8eb3005ad475
-
SHA512
7f9f16430b2b2f2b254b4ca8d9a73b5afeefe7c0ef378901c14757ee5375efb1562b43dd4bdefc795e6d7ba1a46dd71f4dd3c93f922bc15c29163102f56bcb67
-
SSDEEP
384:zs21vtlLQripOY6P5WWgFG95G4JCo2duWLel6GYLzHUuWEIdUu35aahhzmGxSGp+:btlQripODoWGGHGFyLwz0uWPd/30YzmN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4944-0-0x0000000000400000-0x0000000000425000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2840 wrote to memory of 4944 2840 regsvr32.exe 83 PID 2840 wrote to memory of 4944 2840 regsvr32.exe 83 PID 2840 wrote to memory of 4944 2840 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e24ccfd7376d5e82dc9b73edcfdeb826_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e24ccfd7376d5e82dc9b73edcfdeb826_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4944
-