Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
850136e2a5e2c63375d5283d770daba4_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
850136e2a5e2c63375d5283d770daba4_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
850136e2a5e2c63375d5283d770daba4_JaffaCakes118.dll
-
Size
25KB
-
MD5
850136e2a5e2c63375d5283d770daba4
-
SHA1
c03db431174c478eec10ff6bcd3368397f99d03c
-
SHA256
be8052d09293c71bc7f17087a976478a17bbac3bdbfd4a235def40e6f7055845
-
SHA512
1a6da77a8ab0b45abbe8692829b3f784f85ca646d1ccc5cd7d1e224df28af27007f3e181384df0456345e1c0424f295859f4d6a31f6bb6432703de49ee70d85b
-
SSDEEP
384:5731Ql2vDa8kqp9/wNOrt7dpuj+6IOyplb4HK9ZiiUP/Ao0Egk8FxEawbcR6H4Gw:5r142kqXwNmTEN2lMti/jocsHh4e8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3624-3-0x0000000000400000-0x000000000041F000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
regsvr32.exedescription pid Process procid_target PID 4284 wrote to memory of 3624 4284 regsvr32.exe 84 PID 4284 wrote to memory of 3624 4284 regsvr32.exe 84 PID 4284 wrote to memory of 3624 4284 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\850136e2a5e2c63375d5283d770daba4_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\850136e2a5e2c63375d5283d770daba4_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:3624
-