Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 23:21
Behavioral task
behavioral1
Sample
5e1c27a5bb54a5ed3f941598360636b1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e1c27a5bb54a5ed3f941598360636b1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e1c27a5bb54a5ed3f941598360636b1_JaffaCakes118.exe
-
Size
12KB
-
MD5
5e1c27a5bb54a5ed3f941598360636b1
-
SHA1
ca96c59d268f85c625ac5bb10c23859f6606363f
-
SHA256
07610660984830f9417706002c9eb262d4337e4d83245fe64d5440c1b2f2f785
-
SHA512
0344286ac9e0429ab5694af9918290d83b8258dce966fce38e9f14fdd1e7901c6a730d68258ae9bdb64e5e688fd5222b53d011bb971194c90dcf2205babb48a0
-
SSDEEP
192:nmj1yTJ8brexQALo9q+nX6JwCnv3rjNMC/LPQrnSIuNLb:wyVUrQoq6K+C0nSd1
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 15 IoCs
resource yara_rule behavioral2/memory/4120-1-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-2-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-3-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-4-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-5-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-6-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-7-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-8-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-9-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-10-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-11-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-12-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-13-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-14-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 behavioral2/memory/4120-15-0x0000000000400000-0x0000000000411000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/memory/4120-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-1-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-2-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-3-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-4-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-5-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-6-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-7-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-8-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-9-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-10-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-11-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-12-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-13-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-14-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4120-15-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4120 5e1c27a5bb54a5ed3f941598360636b1_JaffaCakes118.exe