Behavioral task
behavioral1
Sample
JaffaCakes118_2a795dd3657a83a9e9e565292e66be10a191c2bebaeb86b985919cc4a22d5d5d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2a795dd3657a83a9e9e565292e66be10a191c2bebaeb86b985919cc4a22d5d5d.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2a795dd3657a83a9e9e565292e66be10a191c2bebaeb86b985919cc4a22d5d5d
-
Size
417KB
-
MD5
ed7288edd50d57e34314ddafeab639b6
-
SHA1
29deaed9628e351c07bdabd7184cccfe9502ed07
-
SHA256
2a795dd3657a83a9e9e565292e66be10a191c2bebaeb86b985919cc4a22d5d5d
-
SHA512
a0cfc28927db5acc77e719e98b682a463997e69ed2103943121b8f45401170261437438ace5e61dc4939af798dc8d589fb1c15b8f3ab02e86e6bcce13c2aa7ee
-
SSDEEP
6144:dBCufBXx/md9Uy7MM259s+xK0dkI6uuP1GqlhWLLiLLwLL5dbgbUNe9:G6tx/yOgcBxRdbUlQu4Nc
Malware Config
Signatures
-
ModiLoader Second Stage 1 IoCs
resource yara_rule sample modiloader_stage2 -
Modiloader family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_2a795dd3657a83a9e9e565292e66be10a191c2bebaeb86b985919cc4a22d5d5d
Files
-
JaffaCakes118_2a795dd3657a83a9e9e565292e66be10a191c2bebaeb86b985919cc4a22d5d5d.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 45KB - Virtual size: 308KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 271KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE