Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 01:41

General

  • Target

    df648fa831b7bd4da022d46f94532808_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    df648fa831b7bd4da022d46f94532808

  • SHA1

    b2db7682c4fe8fc1287ab1d71cc658b652529058

  • SHA256

    f6bfc62a82c6c7f38e0c5993c74393040ae824ce50b5fd2db4ff3ffd30c4bb97

  • SHA512

    22ab90965e989800a1c2ed01f462dea33578e82eec18a8a0197de71a7aaadd5a4577216fa206f929b2f805c60af9a8c53248fd1aaccdba7e090db909cb7d7664

  • SSDEEP

    24576:xCy1+bHj6nwEiefzFfJZm3fEiMnpSNNUaFPRP0WLtzKcl0cq9n/AyVlA6b48l6SP:Mm+Lq6efz9Wva7jWLtzr9A/flAZyY

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df648fa831b7bd4da022d46f94532808_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df648fa831b7bd4da022d46f94532808_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3036-0-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/3036-2-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/3036-1-0x0000000000400000-0x000000000077D000-memory.dmp

    Filesize

    3.5MB