Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 15:16
Behavioral task
behavioral1
Sample
f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe
-
Size
686KB
-
MD5
f012f3173e2ee7c2d12ec0dc15f5a360
-
SHA1
46c43ec5b2d067eef8cef07843824f2a8679f140
-
SHA256
789c5b51a4c5b4ff4c12f30d62ecc962914747d00a38a26f5a499d002ad023d7
-
SHA512
cdccb791713d573a3e154df33edcb05790dfc9923b83a29e2964993453a788b271ccdf3afdda45dd84d12c368481f1a68184d7ab2e2aa0d7853b92c89527517d
-
SSDEEP
12288:D7/CzPyBwCECARz+edDIg32qyIOyo+1tAGiKSGiGAOLpeXolcYW+lo:n6r2TszDf2qy5yo+1tZMEAOLDlcu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 15 IoCs
resource yara_rule behavioral1/memory/1820-2-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-1-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-3-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-4-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-5-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-6-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-7-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-8-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-9-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-10-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-11-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-12-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-13-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-14-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 behavioral1/memory/1820-15-0x0000000000400000-0x0000000000598000-memory.dmp modiloader_stage2 -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1820-0-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-2-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-1-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-3-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-4-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-5-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-6-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-7-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-8-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-9-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-10-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-11-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-12-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-13-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-14-0x0000000000400000-0x0000000000598000-memory.dmp themida behavioral1/memory/1820-15-0x0000000000400000-0x0000000000598000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1820 f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1820 f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f012f3173e2ee7c2d12ec0dc15f5a360_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1820