Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe
-
Size
548KB
-
MD5
026e6b7587d74eaf2541312e58cbcb16
-
SHA1
114e256af23b8f70e2d74c53a791f9d87211cd2f
-
SHA256
a3751773e45f1c053a46d24fddb6e28761730a1220cf3b984ee9a509268426f3
-
SHA512
de50df70140b13a2e3a2f5abc1b9a39bd93aea6febb94403b5b947f15bd317a37f9c4a60ba4959113cc2b0b462afb06121b2e289fd6c8c907c5be4c3f32f844f
-
SSDEEP
12288:Zq6rNnJcjLzuMc2Bt+ajBcxy3+F3Z4mxxvK6e4MTJU/hj:ZnRJa3aWdjBiQmXvuNq/N
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1748-52-0x0000000000400000-0x00000000004E0000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
Processes:
026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\Setupddos.txt 026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2576 1748 WerFault.exe 026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exedescription pid process target process PID 1748 wrote to memory of 4492 1748 026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe IEXPLORE.EXE PID 1748 wrote to memory of 4492 1748 026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\026e6b7587d74eaf2541312e58cbcb16_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 6162⤵
- Program crash
PID:2576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1748 -ip 17481⤵PID:1984