Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 08:36
Behavioral task
behavioral1
Sample
fbe8def4dd971e81d6d5b0d581616b0a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbe8def4dd971e81d6d5b0d581616b0a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fbe8def4dd971e81d6d5b0d581616b0a_JaffaCakes118.dll
-
Size
477KB
-
MD5
fbe8def4dd971e81d6d5b0d581616b0a
-
SHA1
fb83ead475938a22dbfe82ff3862b9b653cea4f0
-
SHA256
30b29d005230ce177d114ef873c72be8101270daea0b794fb16a7064b135d36e
-
SHA512
37b2b0c19f0b42107e3ca8ffd7ae6b136f5ccd6619cdf6d7fcce85595467f2e266c6e0134ff9cb0c59cf19dff74adc3cbd3cf1ba0983fdf7e8c5404f66956337
-
SSDEEP
6144:HSVvSyoySvUkWQ8nfftKoaXLekuI/NnVznkaWmQWRhVBrOc3drt0jw:svSyXSvk0eBSnVznpWmQWR8cxt/
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/2356-0-0x0000000000400000-0x000000000047C000-memory.dmp modiloader_stage2 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4884 wrote to memory of 2356 4884 rundll32.exe 82 PID 4884 wrote to memory of 2356 4884 rundll32.exe 82 PID 4884 wrote to memory of 2356 4884 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbe8def4dd971e81d6d5b0d581616b0a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbe8def4dd971e81d6d5b0d581616b0a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2356
-