Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2025, 20:07

General

  • Target

    JaffaCakes118_970b51b76c0ed85cd627646c0ee88614.exe

  • Size

    269KB

  • MD5

    970b51b76c0ed85cd627646c0ee88614

  • SHA1

    74f8ad4dbdd1eb0aae78466cbfbf0c1a91696b95

  • SHA256

    95dc9f4cc93a9b100455bb0f23ac7c58665d92dcadfa5080898ee0465dc2570a

  • SHA512

    062fef29daa9e2191fd2893beeed667bf41573e0691f80231b3b638b0d12333c316fdbc1a26d36db0dde3a1932654576a624894db36a3226effcaeab4bab83c0

  • SSDEEP

    6144:4703ZkdvmAjGeJqSNHqseOuwLkzEN2PuWosnSPX0HZc3PHfbdT1JTI3x:npKmAjG4qShqseOuHEQn1y3ffbda

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_970b51b76c0ed85cd627646c0ee88614.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_970b51b76c0ed85cd627646c0ee88614.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\dream.exe
      C:\Windows\system32\dream.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\dream.exe

    Filesize

    269KB

    MD5

    970b51b76c0ed85cd627646c0ee88614

    SHA1

    74f8ad4dbdd1eb0aae78466cbfbf0c1a91696b95

    SHA256

    95dc9f4cc93a9b100455bb0f23ac7c58665d92dcadfa5080898ee0465dc2570a

    SHA512

    062fef29daa9e2191fd2893beeed667bf41573e0691f80231b3b638b0d12333c316fdbc1a26d36db0dde3a1932654576a624894db36a3226effcaeab4bab83c0

  • memory/1112-22-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/1112-20-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/3036-0-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/3036-1-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/3036-19-0x00000000031B0000-0x00000000032B4000-memory.dmp

    Filesize

    1.0MB

  • memory/3036-23-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB