Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2025, 20:23

General

  • Target

    JaffaCakes118_97e8e9dace053f080fefae2c7998c42d.exe

  • Size

    2.5MB

  • MD5

    97e8e9dace053f080fefae2c7998c42d

  • SHA1

    157d70f91958686aa0c5aa97eb65e524b3e0db82

  • SHA256

    4921494fbab192c1d202585f16ef5cd46628ce8175c967d65a6dd1c98bf37b07

  • SHA512

    134f9891dea763f4dac798043e39d18b7bd7e851991d993f1702f9ce3973b52362d2273de87cfda8d974628991cd8d60a238c9a7e9e017d70e0fd3b9c120345d

  • SSDEEP

    49152:h/jv6c3CLcIKEkFnJVYAOVUdYmrJh5IzdzQCfV4+81G:t29pWc2BjIvu+iG

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 5 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 14 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 11 IoCs
  • UPX packed file 38 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97e8e9dace053f080fefae2c7998c42d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_97e8e9dace053f080fefae2c7998c42d.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\Temp\1.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp\1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3572
    • C:\Users\Admin\AppData\Local\Temp\Temp\csolzdmz0602.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp\csolzdmz0602.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\SysWOW64\CTFNOM.exe
        "C:\Windows\system32\CTFNOM.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 312
          4⤵
          • Program crash
          PID:1320
      • C:\Windows\SysWOW64\CTFN0M.exe
        "C:\Windows\system32\CTFN0M.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\CTFN0M.exe >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1604
      • C:\Windows\SysWOW64\CTFMOM.exe
        "C:\Windows\system32\CTFMOM.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:220
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\CTFMOM.exe >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2952
      • C:\Windows\SysWOW64\CTFM0M.exe
        "C:\Windows\system32\CTFM0M.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:348
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\CTFM0M.exe >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3656
      • C:\Windows\SysWOW64\CTFM0N.exe
        "C:\Windows\system32\CTFM0N.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\CTFM0N.exe >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4716
      • C:\Windows\SysWOW64\CIFN0N.exe
        "C:\Windows\system32\CIFN0N.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\CIFN0N.exe >> NUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4480
      • C:\Windows\SysWOW64\csolzdmz0602.exe
        "C:\Windows\system32\csolzdmz0602.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3784
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2132 -ip 2132
    1⤵
      PID:3076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Temp\1.exe

      Filesize

      673KB

      MD5

      3fa55dd4cdfea45cf39db40311d634c9

      SHA1

      38dcc3328d58ca9055c7f9201f71a9164bbc9f66

      SHA256

      182e31f4069d482ee5923d8eb6aa62989f9f8cc6755ef05ec6c82398e509affb

      SHA512

      cc9a39b9e0eb83c39a338d2dbf862768bde1ff67c0127f2e8cfd83e4a00f935a1f3ca6337042f680bb653922e6ae12bb89d9499a3eca65886ad4a4e0f39bd6ef

    • C:\Users\Admin\AppData\Local\Temp\Temp\csolzdmz0602.exe

      Filesize

      2.2MB

      MD5

      8d2b0070e22e2a0296f9d506522d701a

      SHA1

      3120b4fc1cad0da0f978e90c7d630be9e4e36400

      SHA256

      22ec9cb8d3d987dbf29f4e6a037ab8dcd46e653daac3e0c64f73626301b2b6ee

      SHA512

      5f907d7039321887c1bec8363c80402cbcf6e70b4d1c7989d7805e49c22ea72d19fc53635a666a2c0616d7e506fc7cbddd75a9d215dba1f44a410b4c7171352a

    • C:\Windows\Fonts\zEfE48cw9EmcFaR.fon

      Filesize

      20KB

      MD5

      05b91e614ef43f145efc2997b2b1af39

      SHA1

      27c8a6d77874d317d36623c09b6bc60d3e9f4221

      SHA256

      87c24d5ae3ab21740bd87485982e1b526c006669d61f8cac3a5b562ab59f7f19

      SHA512

      380886d532b31bed113480745d33e3207b035df5517f667f391e4807717ca62ced756c542628e609ba5d9aea393244723a3d7e1230d55cb3a4964c1a965559eb

    • C:\Windows\SysWOW64\CIFN0N.exe

      Filesize

      27KB

      MD5

      5a2d423664f3a1a89aad7b9cc55eeb85

      SHA1

      8c5a43e179ecb381f562df9a9ba68db81a325888

      SHA256

      4ab89f4926d59bb1ead6ecbe6242d607e4cbf547646af86ab7c3404429be4c2e

      SHA512

      942576897f6e0436b34bee31adfdb3af1da84645e7bb26af02d82a7a95081e328a7cbdce4fbaa2b953cb3f0a999a8d4c6d94c3ae7b776412a52a4ed32c5d8077

    • C:\Windows\SysWOW64\CTFM0M.exe

      Filesize

      26KB

      MD5

      0c43996f86418385658a10579166bf82

      SHA1

      f5160bb14e1e72b801706425d281041045450833

      SHA256

      a4185fb096a3ce67b1f5c8e2137df19f33d8cbffb337d587ba1eacc316fa8279

      SHA512

      2b75f320be629d60acfd9edc1e2f59b1e645f65a366648d54a71c897b2342bc050ef732599c0ccce1f8e7d7a476899451fd3b8c113a4ef58df98d8df4bceccc1

    • C:\Windows\SysWOW64\CTFM0N.exe

      Filesize

      23KB

      MD5

      102f44e4df328a8a1326a115a604275e

      SHA1

      97c90ee748a7f805ac386c36d3893376f10d7c1c

      SHA256

      56da6a991fd4cc55778f133985870be054c20bf7586b005bfa0720824d4b0762

      SHA512

      3b2eb105f7c0d0f63929e820358a2656c92eb19d38e4425e5237c329f617325efc50d1384ec7fa54dbe716ca6c79c2b37e448129479ead641ba10dac95bfeaaa

    • C:\Windows\SysWOW64\CTFMOM.exe

      Filesize

      25KB

      MD5

      ec7d978d43f112ce58bd5e43ff942a50

      SHA1

      f9686692015bdaf59905ad9696bd760ced23ba69

      SHA256

      8f813edfb2a29d0cd467e1e635cf02db75503d2761fc0796e261b5e61191e03b

      SHA512

      79be954b9f836be049d083688cc0120c5232d85ea4c59dd4461c33011631584efb3914ede7cee2616569bb48ce486a8cdbf6529711c0bdf42ac24e08e5b95f4c

    • C:\Windows\SysWOW64\CTFN0M.exe

      Filesize

      27KB

      MD5

      c00d61797214ee2c62bd6044409029dc

      SHA1

      a67e9c4cd342293f41eda15e746c699e572c53e0

      SHA256

      13dca89434b9a0c00d2e4f8fe82e99ecfbed82830c96f5f9e9018786f367d499

      SHA512

      129b2f3de52c52e99a306a5126375291d93b54d1ba27485c66d7d513f269866b719fd503299f8511d26bd124fb4e889cf8aebcd0b0d9adc5bd831e26bcaf154f

    • C:\Windows\SysWOW64\CTFNOM.exe

      Filesize

      15KB

      MD5

      ddd019ffb9e31ff03cc7339bb543eb4f

      SHA1

      6c6c6d198fe8154e5962286059c6a200ad54f0b4

      SHA256

      fe4d316b4a2d8733152518b0533f6987b05819cdce6157b6b9355ea80637110a

      SHA512

      a2d775459b05fc8f14fdb5ef867e7c8bb0b07e21536b7b55d26531e8c03caf5d7fe9fab5ed082fb14ee6b7dae935186c9bc37d9d7de7b8bc91ff9583c64055f4

    • C:\Windows\SysWOW64\JPccCJnKygDdp3.dll

      Filesize

      18KB

      MD5

      6b64c135f5f03d2c7d178ce6a7831981

      SHA1

      e1fcde879e515824b458b01d452312d2c41f6be4

      SHA256

      94e8c58b90e10aace4573e2fbc0f7f3b9e441eef96bebe4a702491bbfb10caa4

      SHA512

      8686227861e9ac6d9010202ed93c0b61356022c11c3e4fd85fc45cda5ee967d93ee1e6e5facfe15d433f6fb831ce8b984c822f82f6bb9543bff692efb812c18e

    • C:\Windows\SysWOW64\Qh6xX7VN48sVPnK.dll

      Filesize

      21KB

      MD5

      520722426e27cfe4aa089a17de31574e

      SHA1

      5da29131e4e832629a15796606c81f44a2c014b2

      SHA256

      0b75704d8f5998e8ec6efcb43c33413f85cbba954a215552198986ee7abdf803

      SHA512

      99df881685bcd5b1bbd1028203257103797098fbebf6dd4eb45ada2f9793f542ab13908757ae672bd0aba1a5c8115af4624965fb57904282f27030bdaba6649c

    • C:\Windows\SysWOW64\csolzdmz0602.exe

      Filesize

      2.0MB

      MD5

      90ef94722bbeb371d8d4fcce820923d6

      SHA1

      c2b90b77fd2673bb4e194c2c7c690675357e3e88

      SHA256

      2916d95150a2b576e786ab3b31ab943b00e44743dda58dac147cb7881d6def66

      SHA512

      34b4fcc3c331c6e983f7184c5c65a4136b33fc111559bbe5ed2d3f4245a7c9a08ff8381f6b60ec8a9a5f5f8c50e1e4847da07419f1ebe5b1554eec6b6f538059

    • C:\Windows\SysWOW64\qzp3jTZCSfSh.dll

      Filesize

      220KB

      MD5

      d54f9204d02f0e5335239284df3da4ac

      SHA1

      e8f32614d2233e8b89dfb336dbcaadc98720a757

      SHA256

      3aa1c2f52bc7e6567c538b11a855282e7961f116a46ef1a8bf9750e46e88174e

      SHA512

      68a9dcb990ef87a5de0fe86861755ff7d07e331a9bb1e84761c37a5c83f1f741000309a6082631a0e751ba66f2cecfad305b463f93d67d40e415af6289b07fba

    • C:\Windows\SysWOW64\xg4hAPNygs29.dll

      Filesize

      17KB

      MD5

      c50a964eeabcc34352a52ac0b2fecabc

      SHA1

      cd63c3094552bf7d121d7d5806d57d2806c2d8b5

      SHA256

      d6a497acdd1c490e1afea5064aeaaddf64e128c9e7daa3078084f415d037f818

      SHA512

      85fa9ab711199f2e5db72df43db984cdb70630d01bbaa33e2383c2835cf7eb88ae7df760b204d1bb911caabdcc16f7d0f30bf48c1b86cc1f029e5f930e27dfe5

    • memory/220-46-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/220-90-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/220-114-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/220-120-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/232-88-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/232-48-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/232-123-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/348-47-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/348-87-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/348-117-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/624-45-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/624-129-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/624-61-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/2132-92-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/2132-35-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB

    • memory/3784-98-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/3784-108-0x0000000005510000-0x0000000005522000-memory.dmp

      Filesize

      72KB

    • memory/3784-107-0x00000000054F0000-0x0000000005502000-memory.dmp

      Filesize

      72KB

    • memory/3784-103-0x00000000054F0000-0x0000000005502000-memory.dmp

      Filesize

      72KB

    • memory/3784-102-0x00000000054D0000-0x00000000054E1000-memory.dmp

      Filesize

      68KB

    • memory/3784-113-0x0000000005530000-0x0000000005542000-memory.dmp

      Filesize

      72KB

    • memory/3784-112-0x0000000005510000-0x0000000005522000-memory.dmp

      Filesize

      72KB

    • memory/3784-130-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/4528-60-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4528-89-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/4528-126-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/5040-20-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/5040-0-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB