Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 07:27
Behavioral task
behavioral1
Sample
a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll
-
Size
48KB
-
MD5
a6a24a79845578cc21d973ddc0d7eca9
-
SHA1
0c9b378eb8becf7d58bfb91b4ec370bf8e98dd5f
-
SHA256
a5174c7fc2bc98bc67d44102665754f1a56908c586435b80b5851eb5fcc49063
-
SHA512
d9f4c6896b62df388782693469d04ccc145dd93724d57b4528344407fa3a52366e8c134e0cf9e167ea65f45ba4bb08f0e9b880058381efd558477318c9d8000e
-
SSDEEP
768:nfJ8NRPLw7hKT76QY7SWust96kH25wsfuaxK04UzQck83jrqtxmgZbtKZ:nfwRP6tskH2SS693DmcJK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1156-0-0x0000000000170000-0x0000000000180000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 620 wrote to memory of 1156 620 rundll32.exe 30 PID 620 wrote to memory of 1156 620 rundll32.exe 30 PID 620 wrote to memory of 1156 620 rundll32.exe 30 PID 620 wrote to memory of 1156 620 rundll32.exe 30 PID 620 wrote to memory of 1156 620 rundll32.exe 30 PID 620 wrote to memory of 1156 620 rundll32.exe 30 PID 620 wrote to memory of 1156 620 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1156
-