Analysis
-
max time kernel
96s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 05:08
Behavioral task
behavioral1
Sample
bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118.dll
-
Size
45KB
-
MD5
bbd8fd73d87344ca862ad5af531a41c2
-
SHA1
85fab079e9ff7af5a5c7183e59f734c36c24482d
-
SHA256
12d1a650acaa33ea3e53ef087ba24d62d17ce021783fc395f22aaafee5e7e8fb
-
SHA512
94f4372c72b431c453540001d54e8e2066aa1b1fe78a3f2120f9ca74a3fd60c46479ff9b6c48fb407df0ad2147a3d348384b118154bab553ad493427dce55111
-
SSDEEP
768:Xy5qsmQpwyQNbGofdT3wRx90TuqvnU0EXXPZxcG0k4LhAXzZe5TtK:i5qsmQWVFTg2ThEnPu6Fe5RK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4496-0-0x00000000003F0000-0x0000000000400000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 396 wrote to memory of 4496 396 rundll32.exe 82 PID 396 wrote to memory of 4496 396 rundll32.exe 82 PID 396 wrote to memory of 4496 396 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bbd8fd73d87344ca862ad5af531a41c2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4496
-