Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
-
Size
384KB
-
MD5
d47eca1186bd3387a4704bf79b9a465e
-
SHA1
7c78087f20e63ea427527788e7031b9db4a8f022
-
SHA256
31e58a5ffe24c8043ecd08816a14a68bfc6b913e8dd2ebc269d9b1fa38c24b4c
-
SHA512
a57517bd3ad539b0e80760fb01ba4b8afb4943bbf282dab458165817e16e5532b757617b7a97c178b2e7655d1e1d65d5ee73ddba8aaf3650f6a0c58a06e0decf
-
SSDEEP
6144:bcTx2F2idZecnl20lHRxp3gFVuYsQ5cOdeRb8iY91EEVKYVAaMB:bcT0F3Z4mxxk7sIcOa/Y91TVK99B
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2768-84-0x0000000003280000-0x00000000032A4000-memory.dmp modiloader_stage2 -
Loads dropped DLL 1 IoCs
pid Process 2768 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2768 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 2768 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 2768 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe 2768 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2768 d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d47eca1186bd3387a4704bf79b9a465e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2768
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c3fd9a35b0694328ff28ad9aaa01544c
SHA1ae094353606ec2f5316fee291c61d673ac259dcb
SHA256d8fc255f69f962a44978be1713f1555a17ea7006c3ccaa14c6dc379b7e7eedc6
SHA5126c3837934ea2edbc3382ad26044676b576068685b3013b4622d1a643210c590b55b0717ff2ee15270e3ee80410438d2e6dc3e0eb649b2d1bcd24037c6b40f4f8