Analysis

  • max time kernel
    101s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 04:26

General

  • Target

    JaffaCakes118_98425a307e6127b8cfdd89e97464b34c.exe

  • Size

    481KB

  • MD5

    98425a307e6127b8cfdd89e97464b34c

  • SHA1

    5d2d09033cf0a7e2da947422277b73be6c0feabe

  • SHA256

    494136e6c04604c4f69dd6af191cbbf555be4cb359e4febe47ff28bde6b17935

  • SHA512

    7ffc43004be7c74c23bdb99673ec2ef12dc36257e948206046b23e45094c9734aa132675255c2a082fac581961a77804b2616bd7c588ffe9deaf742faa78a5ed

  • SSDEEP

    12288:80kgguy60j/7cRyfOSZ5w9zsYXDg6CIMALp4DtB7Yh3nS0Bt:800Ljo+ZnilC98eMh3S8t

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98425a307e6127b8cfdd89e97464b34c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98425a307e6127b8cfdd89e97464b34c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98425a307e6127b8cfdd89e97464b34c.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98425a307e6127b8cfdd89e97464b34c.exe
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Users\Admin\AppData\Local\Temp\serveur.exe
        "C:\Users\Admin\AppData\Local\Temp\serveur.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Users\Admin\AppData\Local\Temp\serveur.exe
          StubPath
          4⤵
          • Executes dropped EXE
          PID:3848
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 460
            5⤵
            • Program crash
            PID:728
      • C:\Users\Admin\AppData\Local\Temp\Loader.exe
        "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2256
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3848 -ip 3848
    1⤵
      PID:2888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\C19H28O2.ini

      Filesize

      119B

      MD5

      e280bc3bc7817bfdbde10ac7fb900ccf

      SHA1

      2268c6eee3be2980805af9bf9bde3cc9a5608af5

      SHA256

      257c6e34c9df36d54c53a16c3b3abf06665d8d517eaa04645c384201ff70e816

      SHA512

      46f08ebb79814ca96cd2e0ad86b794d70da51522accfe41eb126acd5aa07c24d5020cfe7a5f452e1ef1f1ff78ec4f27a0c801fa52a2712ea31ed85284f12a4fe

    • C:\Users\Admin\AppData\Local\Temp\Loader.exe

      Filesize

      425KB

      MD5

      d23870dfc80a0a66c163c983f5c2b9c3

      SHA1

      45abee8e6d13682e5332edb0533af211c31021ff

      SHA256

      119b89e2989184f8d1d6c45d45e778fe13e5cb800ed8cb5e974862cbc571233f

      SHA512

      03dd00c115614da28585dd4957bcdb06cb712e4b57e862c5715f08ac2f0bba8c763d94300c6776b358e93ae082fdb22ec96db2cae721f3243f53a1b388c8e414

    • C:\Users\Admin\AppData\Local\Temp\serveur.exe

      Filesize

      10KB

      MD5

      e385fca84eb38eb437399f25c9650cdc

      SHA1

      a88f78a46d3e9f0e79b4e8f3f72117f44f430f64

      SHA256

      2c28bd7c0c235c3164a6e6b4b8d28c10860bdbc192cf99af69881932f82c7a41

      SHA512

      0e5a1b0c072c329ca428a4edd344ec45d4511a4cb4639d45e8f239b19970b176d4078066b6d9ea2ffe8cc3a02ba1373c6d3b4ac140d7ff7827799d5032add409

    • memory/1844-3-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1844-2-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1844-4-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1844-6-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/1844-26-0x0000000000400000-0x0000000000476000-memory.dmp

      Filesize

      472KB

    • memory/2256-28-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/2256-41-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/2256-42-0x0000000000400000-0x0000000000470000-memory.dmp

      Filesize

      448KB

    • memory/2952-22-0x0000000000400000-0x0000000000402800-memory.dmp

      Filesize

      10KB