Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 21:38
Behavioral task
behavioral1
Sample
9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe
-
Size
74KB
-
MD5
9e097e27488c3c0ea8142ef43bb3602b
-
SHA1
3d5e589a33bb15b8d88b3a42e6663d13c54700ef
-
SHA256
e2b9174ddd893e01b5384cfa8b09678d7f547be67afbaf23b3a3b27be94b92f2
-
SHA512
67deb7897efb426d5052c4c6d57cfb7a291ce52b0ea952df054ac3b1bfb475a8eaa576e77dcffa2a3b7f51c59d944776d96f98ec242378ea75ff99376c4f1ea0
-
SSDEEP
1536:4oqtQEcAycvL0bzOpuiCGJU2h5pBGuRoYGl/HcpBB2y:uQv0DmOJ62htYYm8HB2y
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/files/0x000b000000023b72-2.dat modiloader_stage2 behavioral2/memory/3060-4-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4068-5-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4068-17-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 4068 Updadll.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\OleFiles\Updadll.exe 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe File opened for modification C:\Windows\OleFiles\Updadll.exe 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Updadll.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 3060 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe 4068 Updadll.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3060 wrote to memory of 4068 3060 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 86 PID 3060 wrote to memory of 4068 3060 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 86 PID 3060 wrote to memory of 4068 3060 9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\OleFiles\Updadll.exeC:\Windows\OleFiles\Updadll.exe /Melt C:\Users\Admin\AppData\Local\Temp\9e097e27488c3c0ea8142ef43bb3602b_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD59e097e27488c3c0ea8142ef43bb3602b
SHA13d5e589a33bb15b8d88b3a42e6663d13c54700ef
SHA256e2b9174ddd893e01b5384cfa8b09678d7f547be67afbaf23b3a3b27be94b92f2
SHA51267deb7897efb426d5052c4c6d57cfb7a291ce52b0ea952df054ac3b1bfb475a8eaa576e77dcffa2a3b7f51c59d944776d96f98ec242378ea75ff99376c4f1ea0