Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 20:22

General

  • Target

    JaffaCakes118_97d8cb0f89b46630b233d89be54c7677.exe

  • Size

    102KB

  • MD5

    97d8cb0f89b46630b233d89be54c7677

  • SHA1

    1ad569d0ef33184367325011de80431dffdcfb77

  • SHA256

    91da54aa19bc8c764326c0c15079d8863b3c7ebd5beb2edfbb06dd861c3bcdae

  • SHA512

    55e3ba09d906b9165a3f8a90ad6ed4f3ea3d03cf3b1bf6f3e209ec94d9bda406bbb288ff2aca27d8770c041eafb2a9e2aac57676e721a728300bdb34f4508fdf

  • SSDEEP

    3072:u8fxebqluFJtiCkZf19qhftlFS2SKtB3cmpEwjtLxyz:uW0ap9oT3SuOcEwDyz

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97d8cb0f89b46630b233d89be54c7677.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97d8cb0f89b46630b233d89be54c7677.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2124
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Internet Explorer\icwhelp.dll

    Filesize

    98B

    MD5

    20ed142c3c82cfcc728c34821a6db2d7

    SHA1

    387ed47d9c8130264d66a46f0008290439aa1d13

    SHA256

    65b7013f80f1cfd7918e3177ffc2a0f1b05093cbaa1385d5b9aac1926d838fad

    SHA512

    d525acad95c4fbab8933e3c6ac02fbe1ac5c1c2aaf5e12dea96f8a5ae9e709536a9033176622ac019bf149a936d03b1f5b5d6a2b1c89a7553d8c8e64835802c4

  • memory/2124-0-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2124-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2124-2-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2124-14-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB