Analysis

  • max time kernel
    106s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 01:18

General

  • Target

    JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe

  • Size

    1.8MB

  • MD5

    982c6b28f54ae21246cd475446966a6d

  • SHA1

    46e63fad84a643faa5ab4447f4bbf6b76fedaca1

  • SHA256

    9aa31e35ec0f1391c25e4c950b5139924add75218cc52017c32ef52eba3a8617

  • SHA512

    ae5e71f78016e4b282a2d36aede1d9771c213dee8f0485aa259a1ac2991ffd8002512349051cee0f10ee8e74a5de2d0c9e642d0640f01b9b1b6da6689b1af905

  • SSDEEP

    24576:PQqSDAh58lC2Ndn43YE1OSXRxRLVCWIYRQFihqBZKc0jLxl+D5Fw5wif2vi7kiya:YDAoooARxR2ihqNktl+FF4w+Ia

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3156
        • C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE
          "C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4156
        • C:\Users\Admin\AppData\Local\Temp\SERVER.EXE
          "C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:792
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1812

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE

      Filesize

      1.7MB

      MD5

      36a9981c7e74c5f6d1c4172461d11191

      SHA1

      e5f61f4efc599203e1f9884315f7a28491197d41

      SHA256

      efc4b64356753547b9c1e6a52589c8ce5ca14cb96f193afbc2e12aa1b8cae7e8

      SHA512

      cbcee2edaafe99395a76d8b619bf001fffca132f9c50bf49b9916d0c03f5b0b887250f60a18bb18dcccda30eb9e69cf67daf18c58dc5985e27fd304bd690baf3

    • C:\Users\Admin\AppData\Local\Temp\SERVER.EXE

      Filesize

      50KB

      MD5

      6b60479c101b2057bee082deb3ba93f3

      SHA1

      aa46de0703639e30d65259ac7a79b116afdc40fe

      SHA256

      eff34f42faee5c5e524f668e8e9a89823fd5426cc3cb73f52daf5c444e5baf37

      SHA512

      37ed7a0556dbcbbbf1b48a17f44711c411c841d6089e59797510a35a20fc900ebf2c7ff66c63fd3a55c26652fb35f8b35d5a213cfda596e537541231938e0273

    • memory/792-24-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/792-19-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3156-31-0x0000000049240000-0x000000004940C000-memory.dmp

      Filesize

      1.8MB

    • memory/3396-27-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

      Filesize

      24KB

    • memory/3396-23-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/4156-26-0x00007FFAE8AB5000-0x00007FFAE8AB6000-memory.dmp

      Filesize

      4KB

    • memory/4156-29-0x000000001BAC0000-0x000000001BF8E000-memory.dmp

      Filesize

      4.8MB

    • memory/4156-30-0x00007FFAE8800000-0x00007FFAE91A1000-memory.dmp

      Filesize

      9.6MB

    • memory/4156-33-0x000000001BF90000-0x000000001C02C000-memory.dmp

      Filesize

      624KB

    • memory/4156-34-0x00007FFAE8800000-0x00007FFAE91A1000-memory.dmp

      Filesize

      9.6MB

    • memory/4156-38-0x0000000000F50000-0x0000000000F58000-memory.dmp

      Filesize

      32KB

    • memory/4156-42-0x00007FFAE8AB5000-0x00007FFAE8AB6000-memory.dmp

      Filesize

      4KB

    • memory/4156-43-0x00007FFAE8800000-0x00007FFAE91A1000-memory.dmp

      Filesize

      9.6MB

    • memory/4156-44-0x00007FFAE8800000-0x00007FFAE91A1000-memory.dmp

      Filesize

      9.6MB