Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 05:45
Behavioral task
behavioral1
Sample
fde80584b7423f768ff2c94f4b6b4ac2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fde80584b7423f768ff2c94f4b6b4ac2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fde80584b7423f768ff2c94f4b6b4ac2_JaffaCakes118.exe
-
Size
51KB
-
MD5
fde80584b7423f768ff2c94f4b6b4ac2
-
SHA1
3e016eef1695a0c9d0c5a82f3b6fe499f37b99ef
-
SHA256
6fcc68408cdb2966e6dee8c1baa1e949ea5b5c6754e4e8d07e2baafb6f5f4a5b
-
SHA512
f72429fa662f8bbf9053d326728f91418537256760881a7397c3c235d3a35f0aea0d0529ca5c5bdb0a692c2881ccce18537837998640b6ed9272bae866daca6c
-
SSDEEP
768:wHdTeXvU8xA/icrD/BuwnbkwvT5jYUNx++0QpBuVj6hfHjw:wHZeXPp6rnPvDP0Qp4YxH
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/1160-0-0x0000000010000000-0x0000000010014000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 2340 1160 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fde80584b7423f768ff2c94f4b6b4ac2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fde80584b7423f768ff2c94f4b6b4ac2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fde80584b7423f768ff2c94f4b6b4ac2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 3802⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1160 -ip 11601⤵PID:4824