Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe
-
Size
673KB
-
MD5
f5e9852c1863709a8c115afdc2d92ad9
-
SHA1
c51039185c6850dcba9e25233cea7b91c1e75798
-
SHA256
c164b2a8293ed4637942c977033d80455cab12cc50e41a54a27a6ec4bc9b3e94
-
SHA512
bf9eadc8d3fc9b94b49b4c536475567e2d328e5bfa972d48e14895acb491f95a13734153f382b1b96a6ef4a0936aac6942090c7655cf74124d0fd49604d05554
-
SSDEEP
12288:R8DTiJWRnI0BfGLDqAShGuzoeYSV3xF3Z4mxxxBcLELV4ex5B2cQuQ:2GJ30BufLShGuznYUxQmXxBcLyV/u
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2236-31-0x0000000000400000-0x0000000000568000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2864 2236 f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2864 2236 f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2864 2236 f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2864 2236 f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5e9852c1863709a8c115afdc2d92ad9_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2864
-