Analysis
-
max time kernel
97s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 10:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe
-
Size
40KB
-
MD5
645b47a73b0697dc02e1c2e62ef57581
-
SHA1
f30cc2dfc00cf2c1f2e2242d8e32e3be3c933922
-
SHA256
f34d9a278989fb288fae67ef5e249646fec3348a4e3da0100180ed86130b7976
-
SHA512
12b5d9266c8a932bd52b908d427c872a2c470c86a3aa27ab73eefb1ffcafee5aaa3bd3d6d4fcae82cc1c9f460863d71422800978d8d4695e6b387262a50b66d2
-
SSDEEP
768:B4B2JGYVNfV6vrFDPwp2Gt7YHN0m5vcdXwPXDzHvzExAPOE/3MwVrJ7H8oWXRrKu:BC2oAfIrJwp2Gium5vcxwPzzvzEx6L/c
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/5016-9-0x0000000002260000-0x0000000002284000-memory.dmp modiloader_stage2 behavioral2/memory/5016-11-0x0000000002260000-0x0000000002284000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5016 JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_645b47a73b0697dc02e1c2e62ef57581.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5cc8eeb30c8cbc678b942ddaed7406b6f
SHA1bd89b815a106971b50655902385e6d931bb987a5
SHA256be9bf97498d159a78869392563c766f07a861f312ebbe0902c8ee9f8f3d262c4
SHA5125b23a326ff9883372ec12b1d306f53f63b4d96a59f4ef9e1dce66c6844257fd8b8c831962ff7750e5d82ae0feb5228780976b38c8675870acff743318975b8c3