Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe
-
Size
353KB
-
MD5
f6601229b0e413bdeaf64fdd5e202781
-
SHA1
80059a9257004e2b19a96194ed4e67a2090d29b7
-
SHA256
aa9393fc26ab2a209690a4ecf96741f965a2a5a66d1a056c91c7786f4dc66817
-
SHA512
3ed21f1120e3b1848f58f87d3947e07736517adefacdb2c6aa4f167c2b553452a81c296ccd2505656d18ec28417134b93587d6093ba70f39984f3fa3742ac550
-
SSDEEP
6144:cOL0l9fToYo2ocB9rmRkl0cpd5t4jxjzk7kmjV7mPvhBYjUgQS7l9eaP9jyHzkC:LIl9fRoaB9rmdWd5mljoAmjVSvEogd7e
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1064-5-0x0000000000400000-0x0000000000518000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1064 wrote to memory of 4668 1064 f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe 82 PID 1064 wrote to memory of 4668 1064 f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6601229b0e413bdeaf64fdd5e202781_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:4668
-