Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 02:41
Behavioral task
behavioral1
Sample
245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe
-
Size
860KB
-
MD5
245b2ba0f59bce3f1e96fca98daf6882
-
SHA1
4788007700b91bfaa7e54f7aff4797a6afdd56f6
-
SHA256
cab83fcea34be4f6b5a8eb555c2671ec6301dbec39dcf7040433a21b728e5eba
-
SHA512
7e9fcb33718b7a903ae614ce0bab9a22aa26167d4634546317a62dbeba97f75cc74fc5c6c6eb2f7f47b2abb63dbc9751d604b20bfc5c63b0c6e6df363badb65e
-
SSDEEP
12288:cJjCWhgzbB18PtVY6A2QeTF0XhMzUyGtd:cJmmgPAPc6A2nChAUr
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1832-0-0x0000000000400000-0x0000000000420000-memory.dmp modiloader_stage2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1612 1832 245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe 28 PID 1832 wrote to memory of 1612 1832 245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe 28 PID 1832 wrote to memory of 1612 1832 245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe 28 PID 1832 wrote to memory of 1612 1832 245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe245b2ba0f59bce3f1e96fca98daf6882_JaffaCakes118.exe2⤵PID:1612
-