Analysis
-
max time kernel
91s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 07:27
Behavioral task
behavioral1
Sample
a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll
-
Size
48KB
-
MD5
a6a24a79845578cc21d973ddc0d7eca9
-
SHA1
0c9b378eb8becf7d58bfb91b4ec370bf8e98dd5f
-
SHA256
a5174c7fc2bc98bc67d44102665754f1a56908c586435b80b5851eb5fcc49063
-
SHA512
d9f4c6896b62df388782693469d04ccc145dd93724d57b4528344407fa3a52366e8c134e0cf9e167ea65f45ba4bb08f0e9b880058381efd558477318c9d8000e
-
SSDEEP
768:nfJ8NRPLw7hKT76QY7SWust96kH25wsfuaxK04UzQck83jrqtxmgZbtKZ:nfwRP6tskH2SS693DmcJK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4088-0-0x0000000000400000-0x0000000000410000-memory.dmp modiloader_stage2 -
Program crash 1 IoCs
pid pid_target Process procid_target 1616 4088 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3884 wrote to memory of 4088 3884 rundll32.exe 81 PID 3884 wrote to memory of 4088 3884 rundll32.exe 81 PID 3884 wrote to memory of 4088 3884 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6a24a79845578cc21d973ddc0d7eca9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 6403⤵
- Program crash
PID:1616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4088 -ip 40881⤵PID:3536