Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 16:17
Behavioral task
behavioral1
Sample
JaffaCakes118_6de0607753b650641d429f784e89fec0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6de0607753b650641d429f784e89fec0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6de0607753b650641d429f784e89fec0.exe
-
Size
330KB
-
MD5
6de0607753b650641d429f784e89fec0
-
SHA1
325838551796552a416d5636d4729a0f222fa46c
-
SHA256
ee7d5cb3295cba7fb704bd79eaa18bb3dbb69c7c9b20022b659caa9cc7a2b6cc
-
SHA512
eb8e50034e0cf9602194c68fca79c6a8a4f45b19b9dce7bf34ec5d9b3f366e2fc44b898c6957b8cdb6a2c9b9c7a56823d438d8b90901f2ce2090124472823d6d
-
SSDEEP
6144:XZf1WtKuJuG8qYIdgOcjZsPvwQ7XRTy9fJO4kS67mpKC4:JABdg0d7XRTyrDk0
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1548-8-0x0000000000400000-0x000000000045A000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 1052 e.packed.exe -
Loads dropped DLL 2 IoCs
pid Process 1548 JaffaCakes118_6de0607753b650641d429f784e89fec0.exe 1548 JaffaCakes118_6de0607753b650641d429f784e89fec0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6de0607753b650641d429f784e89fec0.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1052 1548 JaffaCakes118_6de0607753b650641d429f784e89fec0.exe 31 PID 1548 wrote to memory of 1052 1548 JaffaCakes118_6de0607753b650641d429f784e89fec0.exe 31 PID 1548 wrote to memory of 1052 1548 JaffaCakes118_6de0607753b650641d429f784e89fec0.exe 31 PID 1548 wrote to memory of 1052 1548 JaffaCakes118_6de0607753b650641d429f784e89fec0.exe 31 PID 1052 wrote to memory of 2728 1052 e.packed.exe 32 PID 1052 wrote to memory of 2728 1052 e.packed.exe 32 PID 1052 wrote to memory of 2728 1052 e.packed.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6de0607753b650641d429f784e89fec0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6de0607753b650641d429f784e89fec0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\e.packed.exe"C:\Users\Admin\AppData\Local\Temp\e.packed.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 4003⤵PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5cebad46f63050ba8155e014efdc5ce66
SHA119c324b36af11b866edd65c3dbf09bb9c1b41eda
SHA25622f63ca1e8e6150ac67e7e2ea27b6c060f41ad1d5f54cbb7ef92dea7fa398062
SHA5127330e98247baf384da0acd19bfc4b6cdec0f8374e7a4d3740e08b7718fb339dd3a99fb19282190e007eec8d8de71696a5b9e30ebad0d7056544696952fc7655a