Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 19:51 UTC

General

  • Target

    JaffaCakes118_9626cfb220a4d6d3be387187e9b66638.exe

  • Size

    542KB

  • MD5

    9626cfb220a4d6d3be387187e9b66638

  • SHA1

    b88508a9a4f6f75e720c1f5a3af8e0200a40c7fc

  • SHA256

    22845910e8d8e988c6a40f5d583af3eaeb21419e92026623e930150c9c7c9a5c

  • SHA512

    03a7d86bfc8beea8b46102b6cf23de6c4fdabb4a08631669e5718896fcae76f490ffc97e58765177c8124e38d32ee522d0da8624f97a1b09cb3c69864a7ce14b

  • SSDEEP

    12288:Qvx24F0U/9wAosmYRJmRhewxqD3rUfXaDNaqZ/9T+sjEtrwh6dOPD:q9Ft6/x8JCmUCRfZVT+sYWgd

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9626cfb220a4d6d3be387187e9b66638.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9626cfb220a4d6d3be387187e9b66638.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\Server.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\system32\calc.exe"
        3⤵
          PID:2744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 300
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:3000
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\ReDelBat.bat""
        2⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\AutoRun.inf

      Filesize

      166B

      MD5

      42e6ddc67c0c51a3e39780a99988f551

      SHA1

      3422a8dde772d662217339179f81ccb3686780d4

      SHA256

      f9c0462fff3f51f85aa116b2d0f38fd2a8e7263284a3bb1cde9b87a92abfaf01

      SHA512

      e1a316110a286ce72a8948e67b1c38e29cec73720780886873f00f0082ddee21557d8c7eb8106531f4cf0d3bf5b7945b60fe11f792e3ba70879e6a7063acea5b

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\ReDelBat.bat

      Filesize

      212B

      MD5

      589dedae304885508f0559f4c1628fb3

      SHA1

      c31a8f81c26dce244c1dc932c86921b98245fef4

      SHA256

      5f7d21cb11eca48634056841c2d95e4f318164cd0adf4e6fd07b3fd5fa8ba226

      SHA512

      703e264c520aafd660216d07338fce01636d226059931eee9f532ed9dfe3f04be1af8e29f3b0e9bdf39983054596644895279b30a8601f51a7875b41b98d636a

    • F:\Server.exe

      Filesize

      542KB

      MD5

      9626cfb220a4d6d3be387187e9b66638

      SHA1

      b88508a9a4f6f75e720c1f5a3af8e0200a40c7fc

      SHA256

      22845910e8d8e988c6a40f5d583af3eaeb21419e92026623e930150c9c7c9a5c

      SHA512

      03a7d86bfc8beea8b46102b6cf23de6c4fdabb4a08631669e5718896fcae76f490ffc97e58765177c8124e38d32ee522d0da8624f97a1b09cb3c69864a7ce14b

    • memory/2744-38-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2744-42-0x0000000000400000-0x000000000054D000-memory.dmp

      Filesize

      1.3MB

    • memory/2808-47-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2808-30-0x0000000002B90000-0x0000000002CDD000-memory.dmp

      Filesize

      1.3MB

    • memory/2808-25-0x0000000002B90000-0x0000000002CDD000-memory.dmp

      Filesize

      1.3MB

    • memory/2808-2-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2808-0-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2808-1-0x00000000004C4000-0x00000000004C5000-memory.dmp

      Filesize

      4KB

    • memory/2808-55-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2840-32-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2840-33-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2840-37-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2840-57-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    • memory/2840-58-0x0000000000400000-0x000000000054C4EC-memory.dmp

      Filesize

      1.3MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.