Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 01:19
Behavioral task
behavioral1
Sample
e931850813f184e249d47f4e694cbbfc_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e931850813f184e249d47f4e694cbbfc_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
e931850813f184e249d47f4e694cbbfc_JaffaCakes118.dll
-
Size
152KB
-
MD5
e931850813f184e249d47f4e694cbbfc
-
SHA1
10fa2cfa9a2a27ad09edc3949e517db73b0582c2
-
SHA256
b18ed419a8cef68863283eaf63f5f8c14bdb50a8981f35af9e5cfb22afc6ec59
-
SHA512
f21a59dbd6dbd0f25da53e9fc047eb6c2711db28177425a0c674064599f9a57ffbac3ff5a291eb9bee1ba2ede5fafe943df93ea4d10bb6d746d206818238c970
-
SSDEEP
1536:RxMqHlxQezbGss/fh3h6iHCj/v1Nkkf3hBgSprCbOXK4F:b/NzbGss3X6p1NTf3hBgsWbJi
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/3008-0-0x0000000000190000-0x00000000001B6000-memory.dmp modiloader_stage2 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3008 2528 regsvr32.exe 31 PID 2528 wrote to memory of 3008 2528 regsvr32.exe 31 PID 2528 wrote to memory of 3008 2528 regsvr32.exe 31 PID 2528 wrote to memory of 3008 2528 regsvr32.exe 31 PID 2528 wrote to memory of 3008 2528 regsvr32.exe 31 PID 2528 wrote to memory of 3008 2528 regsvr32.exe 31 PID 2528 wrote to memory of 3008 2528 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e931850813f184e249d47f4e694cbbfc_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e931850813f184e249d47f4e694cbbfc_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:3008
-