Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 03:56

General

  • Target

    248bc440725a00c2eae6638ab3cf5330_JaffaCakes118.exe

  • Size

    461KB

  • MD5

    248bc440725a00c2eae6638ab3cf5330

  • SHA1

    4cd4c44de84ca82641bd31056e676ac5e306efba

  • SHA256

    4becfacf30667ca79f3df59a6847726f0672d938fc0c8c97d355bf44f4e94066

  • SHA512

    c89216bf07c1daa8a1fbe6d55ab1eda8a092116e79c37ac3075b5dba34f53949cb6cbb6e10003cfa1d3317f11a3026049d8965ac9530b94172ec0b6cc9a98da7

  • SSDEEP

    12288:nJNGWkYaXnvqOFasxxE/ZC7pvl8fsrkdUgFg8+:nJN43C/s3ftv20wdjFT

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\248bc440725a00c2eae6638ab3cf5330_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\248bc440725a00c2eae6638ab3cf5330_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 140
      2⤵
      • Program crash
      PID:2532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4412 -ip 4412
    1⤵
      PID:224

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4412-1-0x00000000004BB000-0x00000000004D4000-memory.dmp

      Filesize

      100KB

    • memory/4412-0-0x00000000004BB000-0x00000000004D4000-memory.dmp

      Filesize

      100KB

    • memory/4412-2-0x0000000000400000-0x00000000004D38E2-memory.dmp

      Filesize

      846KB

    • memory/4412-3-0x0000000000400000-0x00000000004D38E2-memory.dmp

      Filesize

      846KB