Overview
overview
10Static
static
7c60b982e5f...18.exe
windows7-x64
7c60b982e5f...18.exe
windows10-2004-x64
7$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...om.dll
windows7-x64
5$PLUGINSDI...om.dll
windows10-2004-x64
5$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3flash.dll
windows7-x64
3flash.dll
windows10-2004-x64
3help.chm
windows7-x64
1help.chm
windows10-2004-x64
1order.htm
windows7-x64
3order.htm
windows10-2004-x64
3top flash ...eo.exe
windows7-x64
10top flash ...eo.exe
windows10-2004-x64
10uninst.exe
windows7-x64
8uninst.exe
windows10-2004-x64
8�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1�...��.url
windows7-x64
1�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 05:06
Behavioral task
behavioral1
Sample
c60b982e5f0cf6cf628404adb69569c6_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
c60b982e5f0cf6cf628404adb69569c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DcryptDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/locate.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/locate.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
flash.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
flash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
help.chm
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
help.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
order.htm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
order.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
top flash to video.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
top flash to video.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
ּ.url
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ּ.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
ⷴ.url
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ⷴ.url
Resource
win10v2004-20241007-en
General
-
Target
top flash to video.exe
-
Size
1.6MB
-
MD5
2aa4d2caa73ed5160cc34fba921236c1
-
SHA1
022d065ddb70ffa3bba898e183179772d7c484fd
-
SHA256
5e5ae825b31fa0863f8a3055379306e20ac9f3c554f121f4f0c29430f79e51cf
-
SHA512
3a3b0104b0005d1a158727ca51a797255616af0365090921db58cc70ec3a4a2cadb9a7630384af4cb7a5b134a9de5217bb7499cb02d13c9c92f6124a127fd7fd
-
SSDEEP
24576:G1tYL4dVpWK5GYFHGgGfqa2B7yzzLP0DTXYWCs/tSVmzvIPUrsj2WnkIdINwByd6:G1t5GYEaaD/YTKsVSVHPfnkII96
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral23/memory/2192-14-0x0000000000400000-0x0000000000CD8000-memory.dmp modiloader_stage2 behavioral23/memory/2192-16-0x0000000000400000-0x0000000000CD8000-memory.dmp modiloader_stage2 behavioral23/memory/2192-26-0x0000000000400000-0x0000000000CD8000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2740 CF06674C-EDA6-48df-B12C-F810984ACF54.exe -
Loads dropped DLL 5 IoCs
pid Process 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2580 2192 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language top flash to video.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe 2192 top flash to video.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2580 2192 top flash to video.exe 30 PID 2192 wrote to memory of 2580 2192 top flash to video.exe 30 PID 2192 wrote to memory of 2580 2192 top flash to video.exe 30 PID 2192 wrote to memory of 2580 2192 top flash to video.exe 30 PID 2192 wrote to memory of 2740 2192 top flash to video.exe 31 PID 2192 wrote to memory of 2740 2192 top flash to video.exe 31 PID 2192 wrote to memory of 2740 2192 top flash to video.exe 31 PID 2192 wrote to memory of 2740 2192 top flash to video.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\top flash to video.exe"C:\Users\Admin\AppData\Local\Temp\top flash to video.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 4642⤵
- Program crash
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\CF06674C-EDA6-48df-B12C-F810984ACF54.exe"C:\Users\Admin\AppData\Local\Temp\CF06674C-EDA6-48df-B12C-F810984ACF54.exe"2⤵
- Executes dropped EXE
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c5be6b4274a62a7be11d1c018235a79b
SHA1a6e81b63a198fee34498cd95c78dec73b6957bcc
SHA256551a361bbfb5e01e7de1656059736c0bc0d119d85d020f1b6c61867abc0ca778
SHA512c06d6820c5998f13be5eabb8dd32c5cf2da27168d6ade1defa934ff464e05be276728a02f30d7d803dc6d64ce5eb22a80d2769b0fd6e6517c8351e631daadfde
-
Filesize
1KB
MD5729ae66a977aa54d54dd03bf2a87d5d7
SHA12ba9c4b34bf0911674eab2f19cefd6364e39f61a
SHA25673ee3e8af16af5d1aaf3f5d4e17a939eb49485b219022e9401ad72cdaa97da76
SHA512ffceacc1a66c140805c1c73b89593b3a7076c59b7d67fd7ee06fc551445bd349f4cb2f4f3fe69304eb4a4da8faf280b9a0f7e3577f777fdfb393f56f10c5b85b
-
Filesize
1KB
MD5d88208b9dd72c1a24df73c2ba0684652
SHA1e4ee11ccc15525e3111112bac3d852029cfbaeea
SHA256c6fd6b659dd7ff6e29782c44a689e575f7d8261315f31ae315e268cfc672b11d
SHA512e21500ec0576f8f4e985b985b6ade0288dee7daf0e5248a5167dc0413f5ff65f871dc4c16562ee327dc47626f0db55689f61f98a7dc8a1a382192a743a317b61
-
Filesize
1KB
MD5a3c5c1fcf3586d717a9230d44754825d
SHA11ed948abcc0f8cc8f9c60f2269776b113883a593
SHA256600b20fa5b57f22b0d6576d358e90667901dfd3071b1f5ec06036ecc0c0ee45a
SHA512c9a7e55b7c1af6da64ff2dfafe16e7f1dff7a28a771643353f7b2805b65a80d8a8fca8f58ea04b92ceb293f2c7ed4ea53875499025517b6915d7ff0db968a86b