Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 11:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe
-
Size
644KB
-
MD5
0d3b1e8d465ce468924a6c4f165f0148
-
SHA1
46dc3818cdf16e22d4326883db48efa7fbd67491
-
SHA256
ed65a0d8566f8485b88c03211f1b2d184a7a5706c4b33e2db73e8c07af58969f
-
SHA512
d473483aa31855c46258d98779be3ea9ad5606f1b220c623f8e2028b3ab5492ace6b8e8279bb06d74df88a3654cf345372c8b9ad61b0174a97ef1bdb7375d1e6
-
SSDEEP
12288:a3JrYf8uXXkM3+7dNCFZxfoxF3Z4mxx/57yYJz8YKR:a3d2vUHWJoxQmX/5Bz8YKR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/3200-27-0x0000000000400000-0x000000000051E000-memory.dmp modiloader_stage2 behavioral2/memory/3200-30-0x0000000000400000-0x000000000051E000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3884 3200 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3200 wrote to memory of 1196 3200 JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe 83 PID 3200 wrote to memory of 1196 3200 JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe 83 PID 3200 wrote to memory of 1196 3200 JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d3b1e8d465ce468924a6c4f165f0148.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 6162⤵
- Program crash
PID:3884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3200 -ip 32001⤵PID:3980