Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 08:37

General

  • Target

    197aa9f5114ee5f3140cde6f57562b2b_JaffaCakes118.dll

  • Size

    475KB

  • MD5

    197aa9f5114ee5f3140cde6f57562b2b

  • SHA1

    ce54f1bd971c0b38b2731bdb52599fc4b8508640

  • SHA256

    a7455d58c3dd0a03e7ea75c18051881773fb48db0710add6555df5815415633b

  • SHA512

    38a27869ec86298e533284496608052e7ae63edb6cdb7906005bddc3342195efb2bb1bbede1530f9571b1f9cfc49cfffca398dcf647c013e0983fc0ca79c134d

  • SSDEEP

    12288:/6A+y1vbS+Vnjz936iOnQMkcB8mbpB+YBur:yA11vbS+VjZd2QMklypB+YQr

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\197aa9f5114ee5f3140cde6f57562b2b_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\197aa9f5114ee5f3140cde6f57562b2b_JaffaCakes118.dll,#1
      2⤵
        PID:2092

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2092-0-0x0000000000960000-0x00000000009DC000-memory.dmp
      Filesize

      496KB

    • memory/2092-1-0x0000000000960000-0x00000000009DC000-memory.dmp
      Filesize

      496KB