Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe
-
Size
280KB
-
MD5
5d49afb04f975994b70e69480b7b527d
-
SHA1
354164b34d6f084836883c9539bfd404445a82d3
-
SHA256
6c279630b853dd65b95b8d43ab3012581aabe928ccbaf0518de40069339b0080
-
SHA512
28e58066e98657bc0b626e8bf19fe02c6a6052124dc71142dc77246b8a463c47550132ef787a0812e986dc5137e4de09c13377636db332577592aa7edd0cf4fd
-
SSDEEP
6144:zh0iSvyd1gEs2Iqe5ND/2SIw05mG3J985CW3B0mNXTByHN:6iCEsJqe5JetQG3J95Y0mdNyHN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2728-22-0x0000000000400000-0x000000000050C000-memory.dmp modiloader_stage2 behavioral1/memory/2520-25-0x0000000000400000-0x000000000050C000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 lsassc.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\lsassc.exe 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lsassc.exe 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lsassc.exe lsassc.exe File created C:\Windows\SysWOW64\Delet.bat 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2728 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2728 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2624 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2624 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2624 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 31 PID 2520 wrote to memory of 2624 2520 5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d49afb04f975994b70e69480b7b527d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\lsassc.exeC:\Windows\system32\lsassc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2728
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Delet.bat2⤵
- Deletes itself
PID:2624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5bd5bcc66b9d490e2670f42cd86df9728
SHA196cd71139d2fb29c48877a1eba46a9fa2e1cd12f
SHA256fa852c42eee07bd60388fa0e00939928988fc51bbf225a394926e19764df6bc9
SHA512d45ab7f7a031c937f0cdfba78265fab8e33245dc40c274261e1e309ddb8092a51fb176f5abca43687cdb54cf131f73ec6255a3b01c73882a1fb25909776620ed
-
Filesize
280KB
MD55d49afb04f975994b70e69480b7b527d
SHA1354164b34d6f084836883c9539bfd404445a82d3
SHA2566c279630b853dd65b95b8d43ab3012581aabe928ccbaf0518de40069339b0080
SHA51228e58066e98657bc0b626e8bf19fe02c6a6052124dc71142dc77246b8a463c47550132ef787a0812e986dc5137e4de09c13377636db332577592aa7edd0cf4fd