Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 01:18

General

  • Target

    JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe

  • Size

    1.8MB

  • MD5

    982c6b28f54ae21246cd475446966a6d

  • SHA1

    46e63fad84a643faa5ab4447f4bbf6b76fedaca1

  • SHA256

    9aa31e35ec0f1391c25e4c950b5139924add75218cc52017c32ef52eba3a8617

  • SHA512

    ae5e71f78016e4b282a2d36aede1d9771c213dee8f0485aa259a1ac2991ffd8002512349051cee0f10ee8e74a5de2d0c9e642d0640f01b9b1b6da6689b1af905

  • SSDEEP

    24576:PQqSDAh58lC2Ndn43YE1OSXRxRLVCWIYRQFihqBZKc0jLxl+D5Fw5wif2vi7kiya:YDAoooARxR2ihqNktl+FF4w+Ia

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1236
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE
          "C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2800
        • C:\Users\Admin\AppData\Local\Temp\SERVER.EXE
          "C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE

      Filesize

      1.7MB

      MD5

      36a9981c7e74c5f6d1c4172461d11191

      SHA1

      e5f61f4efc599203e1f9884315f7a28491197d41

      SHA256

      efc4b64356753547b9c1e6a52589c8ce5ca14cb96f193afbc2e12aa1b8cae7e8

      SHA512

      cbcee2edaafe99395a76d8b619bf001fffca132f9c50bf49b9916d0c03f5b0b887250f60a18bb18dcccda30eb9e69cf67daf18c58dc5985e27fd304bd690baf3

    • \Users\Admin\AppData\Local\Temp\SERVER.EXE

      Filesize

      50KB

      MD5

      6b60479c101b2057bee082deb3ba93f3

      SHA1

      aa46de0703639e30d65259ac7a79b116afdc40fe

      SHA256

      eff34f42faee5c5e524f668e8e9a89823fd5426cc3cb73f52daf5c444e5baf37

      SHA512

      37ed7a0556dbcbbbf1b48a17f44711c411c841d6089e59797510a35a20fc900ebf2c7ff66c63fd3a55c26652fb35f8b35d5a213cfda596e537541231938e0273

    • memory/1236-23-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/1236-34-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

      Filesize

      24KB

    • memory/2236-19-0x0000000049240000-0x000000004940C000-memory.dmp

      Filesize

      1.8MB

    • memory/2740-32-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/2740-31-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2800-11-0x000007FEF60BE000-0x000007FEF60BF000-memory.dmp

      Filesize

      4KB

    • memory/2800-30-0x000007FEF5E00000-0x000007FEF679D000-memory.dmp

      Filesize

      9.6MB

    • memory/2800-33-0x000007FEF60BE000-0x000007FEF60BF000-memory.dmp

      Filesize

      4KB

    • memory/2800-50-0x000007FEF5E00000-0x000007FEF679D000-memory.dmp

      Filesize

      9.6MB