Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
09df783395cf530bb7247990d552321e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09df783395cf530bb7247990d552321e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
09df783395cf530bb7247990d552321e_JaffaCakes118.exe
-
Size
709KB
-
MD5
09df783395cf530bb7247990d552321e
-
SHA1
85c90044e131a0e70c4dedba04687de8339dc908
-
SHA256
417b35b79ee5e7084a32715f9806589af969300a0d9c7dcf935edef85d94b51f
-
SHA512
bc0f3f896141d18e7437c8d53d4c0861aee4a812e89c41f55bf1bd37fa28cd6746d8b8ef57b4441ea30f3ef466fda91983490ce752d2aa1f5a18e918867e3a6e
-
SSDEEP
12288:bB8ZUQAtl1qfxeajKV/Z2yVMFjwF3Z4mxxBH2dAch:6CQm1GQjyFwQmXV2ych
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1716-33-0x0000000000400000-0x0000000000516000-memory.dmp modiloader_stage2 -
Drops file in Program Files directory 1 IoCs
Processes:
09df783395cf530bb7247990d552321e_JaffaCakes118.exedescription ioc process File created C:\Program Files\SetupWay.TXT 09df783395cf530bb7247990d552321e_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2636 1716 WerFault.exe 09df783395cf530bb7247990d552321e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
09df783395cf530bb7247990d552321e_JaffaCakes118.exedescription pid process target process PID 1716 wrote to memory of 1572 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe IEXPLORE.EXE PID 1716 wrote to memory of 1572 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe IEXPLORE.EXE PID 1716 wrote to memory of 1572 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe IEXPLORE.EXE PID 1716 wrote to memory of 1572 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe IEXPLORE.EXE PID 1716 wrote to memory of 2636 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe WerFault.exe PID 1716 wrote to memory of 2636 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe WerFault.exe PID 1716 wrote to memory of 2636 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe WerFault.exe PID 1716 wrote to memory of 2636 1716 09df783395cf530bb7247990d552321e_JaffaCakes118.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09df783395cf530bb7247990d552321e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\09df783395cf530bb7247990d552321e_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 3122⤵
- Program crash
PID:2636