Analysis

  • max time kernel
    111s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 12:09

General

  • Target

    JaffaCakes118_0470af82be89a7ca16628a3750453401.exe

  • Size

    640KB

  • MD5

    0470af82be89a7ca16628a3750453401

  • SHA1

    8eeb97aeb8ebb41b63650659a55d88c6f7ad92b7

  • SHA256

    e0912d7f0f40b32c82157922b2358a7e12824d0c0351a0671b7baf2f21edf28a

  • SHA512

    9e43deede1d408f7fc4918ae08225482c2eedfd96a93542aab1b565bca01a10359b50e8ac56f5e278ed54850136585a68ecfad7f4cf420560c69bf3db908c4e2

  • SSDEEP

    12288:R4C1xb9p/uc66E2ksUEVXUgP6E/i2r/NINv5MNf7CYvQTbi6MD3Ae8+zruilcr4z:R3CCVXUgPw2r/NINyNfxvQTberpzK69F

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0470af82be89a7ca16628a3750453401.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0470af82be89a7ca16628a3750453401.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 532
      2⤵
      • Program crash
      PID:1452
    • C:\Windows\SysWOW64\mspaint.exe
      "C:\Windows\system32\mspaint.exe"
      2⤵
        PID:3328
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 12
          3⤵
          • Program crash
          PID:208
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3260 -ip 3260
      1⤵
        PID:3688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3328 -ip 3328
        1⤵
          PID:5028

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3260-23-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-8-0x0000000002560000-0x0000000002561000-memory.dmp

          Filesize

          4KB

        • memory/3260-18-0x00000000035C0000-0x00000000035C1000-memory.dmp

          Filesize

          4KB

        • memory/3260-36-0x00000000007F0000-0x00000000007F1000-memory.dmp

          Filesize

          4KB

        • memory/3260-35-0x00000000035C0000-0x00000000035C1000-memory.dmp

          Filesize

          4KB

        • memory/3260-1-0x0000000002520000-0x0000000002521000-memory.dmp

          Filesize

          4KB

        • memory/3260-2-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/3260-33-0x00000000007E0000-0x00000000007E1000-memory.dmp

          Filesize

          4KB

        • memory/3260-39-0x0000000000400000-0x000000000051A000-memory.dmp

          Filesize

          1.1MB

        • memory/3260-40-0x0000000002350000-0x00000000023A4000-memory.dmp

          Filesize

          336KB

        • memory/3260-32-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-31-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-30-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-29-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-28-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-27-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-26-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-0-0x0000000002350000-0x00000000023A4000-memory.dmp

          Filesize

          336KB

        • memory/3260-34-0x00000000034E0000-0x00000000034E1000-memory.dmp

          Filesize

          4KB

        • memory/3260-3-0x0000000002550000-0x0000000002551000-memory.dmp

          Filesize

          4KB

        • memory/3260-25-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-22-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-21-0x00000000035C0000-0x00000000035C1000-memory.dmp

          Filesize

          4KB

        • memory/3260-20-0x00000000035C0000-0x00000000035C1000-memory.dmp

          Filesize

          4KB

        • memory/3260-19-0x00000000035C0000-0x00000000035C1000-memory.dmp

          Filesize

          4KB

        • memory/3260-17-0x00000000035C0000-0x00000000035C1000-memory.dmp

          Filesize

          4KB

        • memory/3260-16-0x00000000034C0000-0x00000000034C3000-memory.dmp

          Filesize

          12KB

        • memory/3260-15-0x00000000034D0000-0x00000000034D1000-memory.dmp

          Filesize

          4KB

        • memory/3260-14-0x00000000034D0000-0x00000000034D1000-memory.dmp

          Filesize

          4KB

        • memory/3260-13-0x00000000034D0000-0x00000000034D1000-memory.dmp

          Filesize

          4KB

        • memory/3260-12-0x00000000034D0000-0x00000000034D1000-memory.dmp

          Filesize

          4KB

        • memory/3260-11-0x00000000034C0000-0x00000000035C0000-memory.dmp

          Filesize

          1024KB

        • memory/3260-10-0x00000000034C0000-0x00000000035C0000-memory.dmp

          Filesize

          1024KB

        • memory/3260-9-0x00000000024F0000-0x00000000024F1000-memory.dmp

          Filesize

          4KB

        • memory/3260-24-0x0000000003510000-0x0000000003511000-memory.dmp

          Filesize

          4KB

        • memory/3260-7-0x0000000002530000-0x0000000002531000-memory.dmp

          Filesize

          4KB

        • memory/3260-6-0x0000000002540000-0x0000000002541000-memory.dmp

          Filesize

          4KB

        • memory/3260-5-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/3260-4-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/3328-38-0x0000000000400000-0x000000000051A000-memory.dmp

          Filesize

          1.1MB