Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 08:55
Behavioral task
behavioral1
Sample
8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe
-
Size
106KB
-
MD5
8a9f956054d55361fbfa6456dd561894
-
SHA1
8051a1bee3074db03e1219cc0ea028f2f53ff313
-
SHA256
e52190ae16d907183c55e7b1a939c510646363d13eced704cadd3aea138133dd
-
SHA512
a0480da7765bc2efd8986b943de88f9dce41b1be92ce64204b416eb95be192ad747d316457939795d73e969853372ac4fabfe283ab4f47dabb9fcdb400179467
-
SSDEEP
3072:0LCnfucgtJRnOOS2oKISOm7cn+egnbexRewuK:0Ht7nO6Os7cn+Pq
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1804-0-0x0000000000010000-0x0000000000031000-memory.dmp modiloader_stage2 behavioral1/memory/2104-1-0x0000000000010000-0x0000000000031000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exeapocalyps32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious behavior: RenamesItself 2 IoCs
Processes:
8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exeapocalyps32.exepid Process 1804 8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe 2104 apocalyps32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exeapocalyps32.exedescription pid Process procid_target PID 1804 wrote to memory of 2104 1804 8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2104 1804 8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2104 1804 8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2104 1804 8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe 30 PID 2104 wrote to memory of 1776 2104 apocalyps32.exe 31 PID 2104 wrote to memory of 1776 2104 apocalyps32.exe 31 PID 2104 wrote to memory of 1776 2104 apocalyps32.exe 31 PID 2104 wrote to memory of 1776 2104 apocalyps32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a9f956054d55361fbfa6456dd561894_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\apocalyps32.exe-bs2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files\Internet Explorer\iexplore.exe-bs3⤵PID:1776
-
-