Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
ea71102da38466e3eb454bab154c302d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea71102da38466e3eb454bab154c302d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea71102da38466e3eb454bab154c302d_JaffaCakes118.dll
-
Size
179KB
-
MD5
ea71102da38466e3eb454bab154c302d
-
SHA1
c7cc41044b3df0b6b9a5de7c8d866993e1983f23
-
SHA256
bcc777e05cf6cac69acb051fd35adb2628faad6c26738c8e7c7910933bd6b9f9
-
SHA512
73861895de7b7e82339d49b9b956eb1a0d4077fd7cc9c0ea114c6da68be381739b05b61ce09ebde820deb768a661af998b7d5e4aaafcf548fc2f12f916ba383c
-
SSDEEP
3072:JQyRy5UROuYgQnrSh+ds8jTh2U1aB9UXBnDJCm2A8NDl6w8Ym5kBOcgpw4nam:JQyRy5UQuYJraIs8PJaSXtJ1sNDEw8XH
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2192-6-0x0000000001FA0000-0x000000000204E000-memory.dmp modiloader_stage2 behavioral1/memory/2192-7-0x0000000001FA0000-0x000000000204E000-memory.dmp modiloader_stage2 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2192 2656 rundll32.exe 28 PID 2656 wrote to memory of 2192 2656 rundll32.exe 28 PID 2656 wrote to memory of 2192 2656 rundll32.exe 28 PID 2656 wrote to memory of 2192 2656 rundll32.exe 28 PID 2656 wrote to memory of 2192 2656 rundll32.exe 28 PID 2656 wrote to memory of 2192 2656 rundll32.exe 28 PID 2656 wrote to memory of 2192 2656 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea71102da38466e3eb454bab154c302d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea71102da38466e3eb454bab154c302d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2192
-