Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe
-
Size
284KB
-
MD5
67cc43879da57fc5c76c9d31190fb12d
-
SHA1
387d7f6808f3e9ebf7acd99803eb8889c9b27406
-
SHA256
a1321bf7ae0e8e1c9cef32d2fb24d72e2179c0a0c83590a95268d10af6f5b4de
-
SHA512
da70b4051c482b67012c861b965125066653c5122573f9f57202211d3532cb3e55d7b6cff060f5421b50cb7feadbe13eff549e0b4394f1043d016e59433ecfe1
-
SSDEEP
6144:qs0MDkLyqr0B/AHVy5xHgN2uv1Nsq+uIyA6Y5XdhB0S/RTYKbc:SMgyqXVIxHs2OHbIyA6Y5thB0mpYf
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/1540-3-0x0000000000400000-0x0000000000550200-memory.dmp modiloader_stage2 behavioral2/memory/1540-6-0x0000000000400000-0x0000000000550200-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1472 1540 67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe 84 PID 1540 wrote to memory of 1472 1540 67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67cc43879da57fc5c76c9d31190fb12d_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:1472
-