Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 09:34
Behavioral task
behavioral1
Sample
8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe
-
Size
397KB
-
MD5
8a0ebafe5a1dbe44336099a0980e28dd
-
SHA1
a72c35986c7edd0dc09c6c949c66785b2f42588f
-
SHA256
0768d3f5de2abcf20f04206da647cd67832451aeb139d59308d960bbde74f0e5
-
SHA512
93d0b8d91e17e4f4f61a87f2257dc5d9c0be626651a64289a24abf6b36de7b97e96755fe65f3c985a7fbbd6cbfaf23552aadeca25841d8cd177e9373847db06b
-
SSDEEP
6144:MLy84u9nSO2GjZkD10BIY3rb1YfBdfpoZ3u/Ht52w6JSeiFPXmd7:Y+u9nx2GjMY3XKfd/H/9Pu7
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/208-1-0x0000000000400000-0x000000000046A000-memory.dmp modiloader_stage2 behavioral2/memory/208-10-0x0000000000400000-0x000000000046A000-memory.dmp modiloader_stage2 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe" 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exepid process 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe 208 8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a0ebafe5a1dbe44336099a0980e28dd_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:208
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4504