Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 10:51
Behavioral task
behavioral1
Sample
d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe
-
Size
650KB
-
MD5
d2139a5d70ac0564b28f874581102c4b
-
SHA1
0cbcb2bf176798ec8f3f4c204d8531f55ee2e171
-
SHA256
e8dbb069baf6bb993351dbe0b500eddf63d1b9e2354f50b958061544f416e289
-
SHA512
f1f3e6bec62f94d401aef8af6c2b8748ae95ff4ed5ae89486948ef7163d9af2cdab699bb4a7abd4480d950394b1182a02d388f2021524d1ad25a65b62214d33a
-
SSDEEP
12288:Lqq3ywuHhynxC3Kh8X7pR+IXRnZ7EpN/vpudrzlUmBBTT/w+jSDMlDd/:l3yroC3Kh8msEP/vpmp5nTINDMlD
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2140-11-0x0000000000400000-0x000000000051E000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2096 2140 d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2096 2140 d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2096 2140 d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2096 2140 d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2139a5d70ac0564b28f874581102c4b_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2096
-