Analysis

  • max time kernel
    139s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 15:25

General

  • Target

    07412dcdd4f375a675eab10e0be67b23_JaffaCakes118.exe

  • Size

    123KB

  • MD5

    07412dcdd4f375a675eab10e0be67b23

  • SHA1

    9950afef8a259cf11a86ea962852c49a6ea8c17e

  • SHA256

    0f65da1f24a492bac7882f1b3dce1c7113de694a3a4bef0e567cc0a1d0fc9ffb

  • SHA512

    6f637ea0557737008159c2ae963e50103f1316762335d8516e5f7b32de8843150cda2712946fe6f6155a04f204993b8f775c59a3058ac5277cc4c62837205da4

  • SSDEEP

    3072:CLnB88HqMXb+kt+/TLhmOREThrXyRqdTxSOBsZB9rmgkx1QfBF7:aB/r+k1V1QpF7

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07412dcdd4f375a675eab10e0be67b23_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07412dcdd4f375a675eab10e0be67b23_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\07412dcdd4f375a675eab10e0be67b23_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\07412dcdd4f375a675eab10e0be67b23_JaffaCakes118.exe
      2⤵
        PID:1188
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 80
          3⤵
          • Program crash
          PID:4460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1188 -ip 1188
      1⤵
        PID:1320

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1188-0-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/2392-2-0x0000000011000000-0x0000000011025000-memory.dmp

        Filesize

        148KB