Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 08:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe
-
Size
27KB
-
MD5
035af77bfabe9feb7216d76ea52f9d9c
-
SHA1
1f89088b9f7ad6430a286449e1a807cbe776622d
-
SHA256
c96411096f971032c4cf631e5752865b87eef9089573d29393f095970e199708
-
SHA512
e58cc749c1c6454942805beb2649337bc9afa423baf8d1977f3aec51adaaea26d18a17fb9193ec715ad6c61a18b135383b2b7b51121c4e605caad39cec73de88
-
SSDEEP
768:ooTHupC2/kX7My5eq0zs/Nht3eGRCmw/k6UVY:oYuopLXcq//HRCmx6r
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2136-13-0x0000000000400000-0x0000000000425000-memory.dmp modiloader_stage2 behavioral1/memory/2148-12-0x0000000000400000-0x0000000000425000-memory.dmp modiloader_stage2 behavioral1/memory/2136-9-0x0000000000400000-0x0000000000425000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 2136 winow.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\winow.exe JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe File opened for modification C:\Windows\winow.exe JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe File created C:\Windows\winow.dll winow.exe File created C:\Windows\winow.exe winow.exe File created C:\Windows\winow.dll JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2136 2148 JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe 29 PID 2148 wrote to memory of 2136 2148 JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe 29 PID 2148 wrote to memory of 2136 2148 JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe 29 PID 2148 wrote to memory of 2136 2148 JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_035af77bfabe9feb7216d76ea52f9d9c.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\winow.exeC:\Windows\winow.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b27dbcf795441df30fd73d835e616ab0
SHA1fa6470cd483b52787f8d2fa7d3d8d87675d00c87
SHA256c27cbed4480c1458006507490a1c7788c372278cdfff35f001a1598e97d9ae5c
SHA51270887cc46de29bdcd6142f24b874d263cd77f8d1869477a045355f9f3f456f4aaa1bb5d0b2fd68057ebd61724783a1be54be24c227e6bc4535b91b4b5224e013
-
Filesize
27KB
MD5035af77bfabe9feb7216d76ea52f9d9c
SHA11f89088b9f7ad6430a286449e1a807cbe776622d
SHA256c96411096f971032c4cf631e5752865b87eef9089573d29393f095970e199708
SHA512e58cc749c1c6454942805beb2649337bc9afa423baf8d1977f3aec51adaaea26d18a17fb9193ec715ad6c61a18b135383b2b7b51121c4e605caad39cec73de88