Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 20:58
Static task
static1
Behavioral task
behavioral1
Sample
e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe
-
Size
311KB
-
MD5
e3319a681968a8ae69692d69bf3b0f3e
-
SHA1
6ebd34638a3c4a23048f127184451329c0230a42
-
SHA256
c5d1220fd04ceff244ad21b37d2b81042866af55cdf4628e79a4e6b88ff05811
-
SHA512
967ff2a52a2e6c1fbd93a078d98e0b9abbe1e839bf2a8c0796bc3774e23efbd3e3d88311348ae5d0ca4c93e7bca8462b4a6363c9692e62312a8b5c74f408d1e8
-
SSDEEP
6144:GA96zRDy/LCRrCwOlM79pHZ3igHz8Xgv7UQY57U7pI8CyAoTHV42aK8lF0:lg9c2r79/78Xgv7UQY5KWyNTy2S
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral2/memory/1468-5-0x0000000000400000-0x00000000005F5000-memory.dmp modiloader_stage2 behavioral2/memory/1468-6-0x0000000000400000-0x00000000005F5000-memory.dmp modiloader_stage2 behavioral2/memory/1468-8-0x0000000000400000-0x00000000005F5000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 684 1468 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1468 wrote to memory of 2180 1468 e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe 83 PID 1468 wrote to memory of 2180 1468 e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3319a681968a8ae69692d69bf3b0f3e_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 5962⤵
- Program crash
PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1468 -ip 14681⤵PID:4472