Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
f91bb21da3ff22465b5dbd35dbc15cac
-
SHA1
eb329e451d34f9b5f3b80be20e395d1073d5db61
-
SHA256
8ab9835526824935ac689c807bc8a274e963d11bc8ec0fd0837b34a43f47d7e8
-
SHA512
efeadac100d793b5a547f3ddfbc0b7375422ed2bd94e962710fbed8393d5830f08c45b22d0405a93a32ed187f24d46e0a76b519d29bd69a9a959bba8a8761c35
-
SSDEEP
49152:D0foBvPfSOMW/bNmna5TxkTiBpCKaYj65aBOJ7DyVbykGex:ZvZ/bNmqXBdaYvOpy5ykGK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/memory/2524-2-0x0000000010001000-0x000000001000A000-memory.dmp modiloader_stage2 behavioral1/memory/2524-3-0x0000000010000000-0x000000001024B000-memory.dmp modiloader_stage2 behavioral1/memory/2524-12-0x0000000010000000-0x000000001024B000-memory.dmp modiloader_stage2 behavioral1/memory/2524-11-0x0000000010000000-0x000000001024B000-memory.dmp modiloader_stage2 behavioral1/memory/2524-10-0x0000000010001000-0x000000001000A000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/memory/1124-39-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-38-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-37-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-36-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-34-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-33-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-32-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-30-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-29-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-28-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-27-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-25-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-24-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-23-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-22-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-20-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-19-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-17-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-16-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-15-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-8-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-35-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-31-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-26-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-21-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-14-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-40-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-41-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-42-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-44-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-43-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-46-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-45-0x0000000000400000-0x000000000065E000-memory.dmp themida behavioral1/memory/1124-66-0x0000000000400000-0x000000000065E000-memory.dmp themida -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2524 set thread context of 1124 2524 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1124 2524 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 30 PID 2524 wrote to memory of 1124 2524 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 30 PID 2524 wrote to memory of 1124 2524 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 30 PID 2524 wrote to memory of 1124 2524 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 30 PID 2524 wrote to memory of 1124 2524 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 30 PID 2524 wrote to memory of 1124 2524 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 30 PID 1124 wrote to memory of 1212 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 21 PID 1124 wrote to memory of 1212 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 21 PID 1124 wrote to memory of 1212 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 21 PID 1124 wrote to memory of 1212 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 21 PID 1124 wrote to memory of 1212 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 21 PID 1124 wrote to memory of 1212 1124 f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f91bb21da3ff22465b5dbd35dbc15cac_JaffaCakes118.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1124
-
-