Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe
-
Size
584KB
-
MD5
17681f41da5f8680c9becbaf8276e882
-
SHA1
dfb2b82d5e6aa24776383aa8e9b88cf1f2d1bfb6
-
SHA256
858aeeb253d46f27f371b704614ca9d152cdf687781e8ce7ae0ecc65261f1b61
-
SHA512
8d229dd236ad9018b7690eabb7fd9db17598cdad1a5c2128ebf7c5ad276564dcd39fe8bf4989dba7649fe0dca988428ce709b537fc3edd9ce7deb8e2736f09b6
-
SSDEEP
12288:OW1K1f59s0jV/phEh+/twMmUgFfbqT6e2kS/F3Z4mxxXHI0RNyLnsObR:O8Kl595jVRqHDJquEEQmXNbyjsgR
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2240-45-0x0000000000400000-0x0000000000552000-memory.dmp modiloader_stage2 behavioral2/memory/2240-47-0x0000000000400000-0x0000000000552000-memory.dmp modiloader_stage2 behavioral2/memory/2240-48-0x0000000000400000-0x0000000000552000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
Processes:
17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4348 2240 WerFault.exe 17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exedescription pid process target process PID 2240 wrote to memory of 1080 2240 17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe IEXPLORE.EXE PID 2240 wrote to memory of 1080 2240 17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17681f41da5f8680c9becbaf8276e882_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 6522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2240 -ip 22401⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2240-0-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/2240-1-0x00000000023B0000-0x0000000002404000-memory.dmpFilesize
336KB
-
memory/2240-44-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-43-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-42-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-41-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-40-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-39-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-38-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-37-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-36-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-35-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-34-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-33-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-32-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-31-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-30-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-29-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-28-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-27-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-26-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-25-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-24-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-23-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-22-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-21-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-20-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-19-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-18-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-17-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-16-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2240-15-0x0000000003510000-0x0000000003511000-memory.dmpFilesize
4KB
-
memory/2240-14-0x0000000003510000-0x0000000003511000-memory.dmpFilesize
4KB
-
memory/2240-13-0x0000000003510000-0x0000000003511000-memory.dmpFilesize
4KB
-
memory/2240-12-0x0000000003510000-0x0000000003511000-memory.dmpFilesize
4KB
-
memory/2240-11-0x0000000003510000-0x0000000003511000-memory.dmpFilesize
4KB
-
memory/2240-10-0x0000000002530000-0x0000000002531000-memory.dmpFilesize
4KB
-
memory/2240-9-0x00000000025A0000-0x00000000025A1000-memory.dmpFilesize
4KB
-
memory/2240-8-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/2240-7-0x0000000002580000-0x0000000002581000-memory.dmpFilesize
4KB
-
memory/2240-6-0x0000000002510000-0x0000000002511000-memory.dmpFilesize
4KB
-
memory/2240-5-0x0000000002520000-0x0000000002521000-memory.dmpFilesize
4KB
-
memory/2240-4-0x0000000002590000-0x0000000002591000-memory.dmpFilesize
4KB
-
memory/2240-3-0x0000000002540000-0x0000000002541000-memory.dmpFilesize
4KB
-
memory/2240-2-0x0000000002560000-0x0000000002561000-memory.dmpFilesize
4KB
-
memory/2240-45-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/2240-47-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/2240-48-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/2240-49-0x00000000023B0000-0x0000000002404000-memory.dmpFilesize
336KB