Behavioral task
behavioral1
Sample
JaffaCakes118_a7cfc1e0d8590e3777c4d48afd64652f.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a7cfc1e0d8590e3777c4d48afd64652f.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a7cfc1e0d8590e3777c4d48afd64652f
-
Size
747KB
-
MD5
a7cfc1e0d8590e3777c4d48afd64652f
-
SHA1
6a069f397d33af0474ec305823ce0f3cdf7429e2
-
SHA256
4ccffe08d73c4cbbb7da105beaec198462e1cbdcbc070df8cd06846eb8860d8b
-
SHA512
92ac353b1242639e321a7d8eb9c9579fdb59a9550908326d6a6b153a53f294594d733796245e70009a9f090c0fdd638412fad890a73700285d4942c172403980
-
SSDEEP
12288:vaXgrSgQHYPRgvWlivy8jck/Bdhnp+XQ3aBY1xC2dTsHNvLbzJTV:CwbJgvWlwy9Y4XsJCvjJT
Malware Config
Signatures
-
ModiLoader Second Stage 1 IoCs
resource yara_rule sample modiloader_stage2 -
Modiloader family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_a7cfc1e0d8590e3777c4d48afd64652f
Files
-
JaffaCakes118_a7cfc1e0d8590e3777c4d48afd64652f.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 613KB - Virtual size: 613KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 27KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 20B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
NewSec Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE