Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe
-
Size
579KB
-
MD5
19609d0b1390d8be9bcbf960a137ae07
-
SHA1
09ed41fee89f409544350f04933fd66bb18687dc
-
SHA256
7c5539f2061404344c035627a2656b63cf5a287dc035948bb562e6aea7f0f597
-
SHA512
bcce4197b2cd875d6a5991a1ac1e91803b170dadff830964de70663432aeebff7ff8061a18786a7c09febadfd5be68cb57ce0040357d9e5e6f1901b23dbf01cc
-
SSDEEP
12288:rezA38xDfaZWHoGe+B4216ZQxF3Z4mxxVDqVTVOCV:rzMxhHTeGX5xQmXkVTzV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral2/memory/632-11-0x0000000003380000-0x0000000003429000-memory.dmp modiloader_stage2 behavioral2/memory/632-73-0x0000000000400000-0x000000000054F000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
Processes:
19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt 19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4992 632 WerFault.exe 19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exedescription pid process target process PID 632 wrote to memory of 60 632 19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe IEXPLORE.EXE PID 632 wrote to memory of 60 632 19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19609d0b1390d8be9bcbf960a137ae07_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 6522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 632 -ip 6321⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/632-1-0x0000000000700000-0x0000000000754000-memory.dmpFilesize
336KB
-
memory/632-0-0x0000000000400000-0x000000000054F000-memory.dmpFilesize
1.3MB
-
memory/632-10-0x00000000023C0000-0x00000000023C1000-memory.dmpFilesize
4KB
-
memory/632-9-0x0000000002430000-0x0000000002431000-memory.dmpFilesize
4KB
-
memory/632-8-0x0000000002400000-0x0000000002401000-memory.dmpFilesize
4KB
-
memory/632-7-0x0000000002410000-0x0000000002411000-memory.dmpFilesize
4KB
-
memory/632-6-0x0000000002390000-0x0000000002391000-memory.dmpFilesize
4KB
-
memory/632-5-0x00000000023B0000-0x00000000023B1000-memory.dmpFilesize
4KB
-
memory/632-4-0x0000000002420000-0x0000000002421000-memory.dmpFilesize
4KB
-
memory/632-71-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-70-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-69-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-68-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-67-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-66-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-65-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-64-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-63-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-62-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-61-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-60-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-59-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-58-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-57-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-56-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-55-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-54-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-53-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-52-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-51-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-50-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-49-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-48-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-47-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-46-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-45-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-44-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-43-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-42-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-41-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-40-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-39-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-38-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-37-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-36-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-35-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-34-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-33-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-32-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-31-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-30-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-29-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-28-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-27-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-26-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-25-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-24-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-23-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-22-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-21-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-20-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-19-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-18-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-17-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-16-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-15-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-14-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-13-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/632-12-0x0000000003390000-0x0000000003391000-memory.dmpFilesize
4KB
-
memory/632-11-0x0000000003380000-0x0000000003429000-memory.dmpFilesize
676KB
-
memory/632-3-0x00000000023D0000-0x00000000023D1000-memory.dmpFilesize
4KB
-
memory/632-2-0x00000000023F0000-0x00000000023F1000-memory.dmpFilesize
4KB
-
memory/632-74-0x0000000000700000-0x0000000000754000-memory.dmpFilesize
336KB
-
memory/632-73-0x0000000000400000-0x000000000054F000-memory.dmpFilesize
1.3MB
-
memory/632-75-0x0000000003380000-0x0000000003386000-memory.dmpFilesize
24KB