Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 07:46
Behavioral task
behavioral1
Sample
JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe
-
Size
48KB
-
MD5
03131eb1792488d5ca7b2438ec49a4ad
-
SHA1
27ac79500b31db047d48416337ee03632b14c236
-
SHA256
e620f7c0fab6533f36f5036878cb3bbf1307f8fcec4d5015d249818804b51279
-
SHA512
53ea230c3c97867fec31308e6671767cddb7e0037aaca1e0d6eb5a59af7930369bf76f867aef5e076cf13c5eb9e19dd8732d522fecc56c978e58020f3768a338
-
SSDEEP
1536:mFNkVvrs9DVAlGqEPBCJUlwDAGPdwK2Kz:mFaRqnqEPB/lwDAGlw9M
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/files/0x0009000000023c60-2.dat modiloader_stage2 behavioral2/memory/1360-5-0x0000000002150000-0x000000000216A000-memory.dmp modiloader_stage2 behavioral2/memory/1360-8-0x0000000000400000-0x0000000000423000-memory.dmp modiloader_stage2 behavioral2/memory/1360-9-0x0000000002150000-0x000000000216A000-memory.dmp modiloader_stage2 behavioral2/memory/1360-29-0x0000000002150000-0x000000000216A000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 1360 JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe 1360 JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe -
resource yara_rule behavioral2/memory/1360-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1360-8-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo1.dll JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1360 JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_03131eb1792488d5ca7b2438ec49a4ad.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD57f66d7605fc594d705386b1c2f331299
SHA19e1406fc57638ec209a13f8d6fd0ff178ef3044d
SHA256587f4b774b848af927d611b9fe292ae4af30444776fe45914610bfd0da543481
SHA512981225e522ba36c9b1d5c59e9fdf3c073c97876ea3f6d08b5161cc1e267f4035c304c8f31ce15bb6b830f40cc0017cacb8a5fc50199d8cfd1a3843aa93d2e8b2