Analysis
-
max time kernel
103s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 17:31
Behavioral task
behavioral1
Sample
e544acf1b54db737da5dad85144442fb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e544acf1b54db737da5dad85144442fb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e544acf1b54db737da5dad85144442fb_JaffaCakes118.dll
-
Size
475KB
-
MD5
e544acf1b54db737da5dad85144442fb
-
SHA1
951405bd657fae83690a98561f0c88a2d501938a
-
SHA256
30f62e81df5056e7e3599bfeef2ec567f240c2a8342a7c611fa86985b6e2967c
-
SHA512
7cb3eeedca6195e004621183da6513300f2d082e99feb4fe5b222ade8bbc74bde5351afdd36c17fca944eac974dd323114dbe5c1cf23060d22de10e9f317f35f
-
SSDEEP
12288:b6A+y1vbS+Vnjz936iOnQMkWB8a1wBQYBu:eA11vbS+VjZd2QMk7AwBQYQ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/3596-0-0x0000000001EA0000-0x0000000001F1C000-memory.dmp modiloader_stage2 behavioral2/memory/3596-1-0x0000000001EA0000-0x0000000001F1C000-memory.dmp modiloader_stage2 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1112 wrote to memory of 3596 1112 rundll32.exe 82 PID 1112 wrote to memory of 3596 1112 rundll32.exe 82 PID 1112 wrote to memory of 3596 1112 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e544acf1b54db737da5dad85144442fb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e544acf1b54db737da5dad85144442fb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3596
-