Malware Analysis Report

2024-08-06 14:11

Sample ID 240614-gx2rda1hnn
Target a845de7e8d88bb394683f055d5c539f1_JaffaCakes118
SHA256 f61291715f368c2089c99aff3811382b17314750e6f3088fa1c96bdfb37ed383
Tags
modiloader trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f61291715f368c2089c99aff3811382b17314750e6f3088fa1c96bdfb37ed383

Threat Level: Known bad

The file a845de7e8d88bb394683f055d5c539f1_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

modiloader trojan

ModiLoader Second Stage

Modiloader family

ModiLoader, DBatLoader

ModiLoader Second Stage

Executes dropped EXE

Drops file in Windows directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 06:11

Signatures

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

Modiloader family

modiloader

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 06:11

Reported

2024-06-14 06:14

Platform

win7-20240419-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\apocalyps32.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\apocalyps32.exe C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe N/A
File opened for modification C:\Windows\apocalyps32.exe C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe N/A
File created C:\Windows\apocalyps32.exe C:\Windows\apocalyps32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe"

C:\Windows\apocalyps32.exe

-bs

C:\Program Files\Internet Explorer\iexplore.exe

-bs

Network

N/A

Files

C:\Windows\apocalyps32.exe

MD5 a845de7e8d88bb394683f055d5c539f1
SHA1 341ea7996fe18db12ab960b54e58e5d13483fc19
SHA256 f61291715f368c2089c99aff3811382b17314750e6f3088fa1c96bdfb37ed383
SHA512 8ba77d7225c562fe5d720aeb959facf7cf4b445c8a788bd84c9351a61cab417b51b1a01d8eb2ec865704a1c3a3d45b8eaa962f7af3372f40d111bfe7a7595f80

memory/2212-8-0x0000000000010000-0x0000000000030000-memory.dmp

memory/1680-5-0x0000000000010000-0x0000000000030000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 06:11

Reported

2024-06-14 06:14

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

53s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\apocalyps32.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\apocalyps32.exe C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe N/A
File opened for modification C:\Windows\apocalyps32.exe C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe N/A
File created C:\Windows\apocalyps32.exe C:\Windows\apocalyps32.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a845de7e8d88bb394683f055d5c539f1_JaffaCakes118.exe"

C:\Windows\apocalyps32.exe

-bs

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

-bs

Network

Files

C:\Windows\apocalyps32.exe

MD5 a845de7e8d88bb394683f055d5c539f1
SHA1 341ea7996fe18db12ab960b54e58e5d13483fc19
SHA256 f61291715f368c2089c99aff3811382b17314750e6f3088fa1c96bdfb37ed383
SHA512 8ba77d7225c562fe5d720aeb959facf7cf4b445c8a788bd84c9351a61cab417b51b1a01d8eb2ec865704a1c3a3d45b8eaa962f7af3372f40d111bfe7a7595f80

memory/3152-4-0x0000000000010000-0x0000000000030000-memory.dmp

memory/4644-5-0x0000000000010000-0x0000000000030000-memory.dmp