Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 16:54
Behavioral task
behavioral1
Sample
02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe
-
Size
352KB
-
MD5
02586509fbb9f1cbc6db3ec3a5bdd71e
-
SHA1
6fbfa4ee7f576ca14d927ffa9768f9b046166196
-
SHA256
e18bf43d3b355e4b9285cb9fcd927212e99226400a1948a5e4d9f902abc2c3a7
-
SHA512
74a946a7bcfa7b57132f09384d7bf33b6ee5177d46152a6ee1d20d7c61e876fc6d389cb6de7d43d5f304b064acb1da1e9283ce2965851b671430b3f2e479ebb1
-
SSDEEP
6144:BPO4Uu//A9R9SRdmOOTdp/JoW6FR2k2VGr51pzQKzuJcSDKFP8hoUPdRS2DS5:Bg22uRdmOOJozR2k2VGd1LuJcGKFQoUI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 11 IoCs
resource yara_rule behavioral1/memory/3052-9-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-24-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-26-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-25-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-19-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-17-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-15-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-22-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-13-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-11-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral1/memory/3052-27-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/2568-0-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/2568-2-0x0000000000400000-0x00000000004F6000-memory.dmp upx behavioral1/memory/2568-23-0x0000000000400000-0x00000000004F6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3052 2568 02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02586509fbb9f1cbc6db3ec3a5bdd71e_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3052
-