Analysis
-
max time kernel
79s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 11:48
Behavioral task
behavioral1
Sample
a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe
-
Size
224KB
-
MD5
a1c025fc274e1ea1443515273b816142
-
SHA1
c1a7d75c0a769735ffa4110977bf9ea3c8511fc0
-
SHA256
f2f79f4e80519e3eb0136b6f89dac2268ec6a64964afc131438845d3c2e5f653
-
SHA512
70e3523be16d6a60475e1e3f69af2732daf3cd0f321ea2cb83b7ceb03febcc11c561038c90f7743a41f5a03ded21ea6821673aa58b24c0d36479d45b5a42872d
-
SSDEEP
3072:7JBMwprZBp4VC/q3cGftIrfDP7xoo19qDfnQoCbg7SiWN:dntZBGVEQcGfcT9oo3unQvbg7Ra
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1824-9-0x0000000000400000-0x000000000043F000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2248 killer ÓíÑÝÑ ÎÇã.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 1824 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language killer ÓíÑÝÑ ÎÇã.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2248 killer ÓíÑÝÑ ÎÇã.exe 2248 killer ÓíÑÝÑ ÎÇã.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2248 1824 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2248 1824 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2248 1824 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2248 1824 a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe 28 PID 2248 wrote to memory of 1196 2248 killer ÓíÑÝÑ ÎÇã.exe 20 PID 2248 wrote to memory of 1196 2248 killer ÓíÑÝÑ ÎÇã.exe 20 PID 2248 wrote to memory of 1196 2248 killer ÓíÑÝÑ ÎÇã.exe 20 PID 2248 wrote to memory of 1196 2248 killer ÓíÑÝÑ ÎÇã.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1c025fc274e1ea1443515273b816142_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\killer ÓíÑÝÑ ÎÇã.exe"C:\Users\Admin\AppData\Local\Temp\killer ÓíÑÝÑ ÎÇã.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5e7f2cfa32ba337cd5343758c3cd1cce2
SHA185d19db4ded9168a40f83ae91f2d6607796c0dc9
SHA2561e057edcfa8b79d3a2e477e491b46492a6eb7c40c04b73f56d84938ba926e714
SHA5129d6b01096350760f952e9e4a6be8eb1ef3ea07c1c43bb935fefc9dd6c54018d3f56823347882b08fb48007e2341d7b2278f7f9b8459bb4239f5bccb166191893