Analysis
-
max time kernel
106s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 01:18
Behavioral task
behavioral1
Sample
JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe
-
Size
1.8MB
-
MD5
982c6b28f54ae21246cd475446966a6d
-
SHA1
46e63fad84a643faa5ab4447f4bbf6b76fedaca1
-
SHA256
9aa31e35ec0f1391c25e4c950b5139924add75218cc52017c32ef52eba3a8617
-
SHA512
ae5e71f78016e4b282a2d36aede1d9771c213dee8f0485aa259a1ac2991ffd8002512349051cee0f10ee8e74a5de2d0c9e642d0640f01b9b1b6da6689b1af905
-
SSDEEP
24576:PQqSDAh58lC2Ndn43YE1OSXRxRLVCWIYRQFihqBZKc0jLxl+D5Fw5wif2vi7kiya:YDAoooARxR2ihqNktl+FF4w+Ia
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/3156-31-0x0000000049240000-0x000000004940C000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe -
Executes dropped EXE 2 IoCs
pid Process 4156 GLIDERDEPLOY.EXE 792 SERVER.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 792 SERVER.EXE 792 SERVER.EXE 792 SERVER.EXE 792 SERVER.EXE 4156 GLIDERDEPLOY.EXE 4156 GLIDERDEPLOY.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1812 OpenWith.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3156 wrote to memory of 4156 3156 JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe 87 PID 3156 wrote to memory of 4156 3156 JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe 87 PID 3156 wrote to memory of 792 3156 JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe 88 PID 3156 wrote to memory of 792 3156 JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe 88 PID 3156 wrote to memory of 792 3156 JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe 88 PID 792 wrote to memory of 3396 792 SERVER.EXE 56 PID 792 wrote to memory of 3396 792 SERVER.EXE 56 PID 792 wrote to memory of 3396 792 SERVER.EXE 56 PID 792 wrote to memory of 3396 792 SERVER.EXE 56 PID 792 wrote to memory of 3396 792 SERVER.EXE 56 PID 792 wrote to memory of 3396 792 SERVER.EXE 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_982c6b28f54ae21246cd475446966a6d.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"C:\Users\Admin\AppData\Local\Temp\GLIDERDEPLOY.EXE"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"C:\Users\Admin\AppData\Local\Temp\SERVER.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:792
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD536a9981c7e74c5f6d1c4172461d11191
SHA1e5f61f4efc599203e1f9884315f7a28491197d41
SHA256efc4b64356753547b9c1e6a52589c8ce5ca14cb96f193afbc2e12aa1b8cae7e8
SHA512cbcee2edaafe99395a76d8b619bf001fffca132f9c50bf49b9916d0c03f5b0b887250f60a18bb18dcccda30eb9e69cf67daf18c58dc5985e27fd304bd690baf3
-
Filesize
50KB
MD56b60479c101b2057bee082deb3ba93f3
SHA1aa46de0703639e30d65259ac7a79b116afdc40fe
SHA256eff34f42faee5c5e524f668e8e9a89823fd5426cc3cb73f52daf5c444e5baf37
SHA51237ed7a0556dbcbbbf1b48a17f44711c411c841d6089e59797510a35a20fc900ebf2c7ff66c63fd3a55c26652fb35f8b35d5a213cfda596e537541231938e0273