Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 05:49

General

  • Target

    e420b5683dac9c18c7bd7e33d2bc1d9a_JaffaCakes118.dll

  • Size

    55KB

  • MD5

    e420b5683dac9c18c7bd7e33d2bc1d9a

  • SHA1

    ea8d690030788cfbf4b79affd8c3033215744256

  • SHA256

    5175e9ddcc842c0946843cd710413a396b0f97d9bc2f6316a56d30b13a1635af

  • SHA512

    f26fda525e4779e422b48aee119c986a4e423a1c6a95ed43fb3bff50363f7c3a59f1987b4d7b58d4ef2317fd7774d07b3f0d186fb5789faa81e006ec7d6c81b3

  • SSDEEP

    1536:NkqyQnony+nKRF6JC1NNiHCj/k8E/YXZC2:MgotWSb/YX42

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\e420b5683dac9c18c7bd7e33d2bc1d9a_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\e420b5683dac9c18c7bd7e33d2bc1d9a_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-0-0x0000000000330000-0x0000000000342000-memory.dmp

    Filesize

    72KB