Analysis

  • max time kernel
    120s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 04:38

General

  • Target

    02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    02dcad2dc67e6808fb7eab1bb84ffcae

  • SHA1

    f15eaa4e8115abed28f5f53ec59d38995a066437

  • SHA256

    5dfff5ac350d6e51a5ec28fe728d9c918a1f5882241c6660aa303d4dae0ad5e4

  • SHA512

    601552ee1dd7669dbd76439bf25cc592c19b715297e17d0e017d8b751753e255561296efa69fceba6ce82f06333aa3b4ae93fa2697bbad041c0dac797ad0f3f5

  • SSDEEP

    6144:j80Mh2tKu20EIixqjqEwS8C3dbzmclGkpYRMcOqwpfYqFSV6T:/Mh2tk0ji0FwS8KlGkpnBHpA0SV6

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a150e340145463b9f52dfebf0e327c92

    SHA1

    1d9a0dbbd2a9bdb3feb71ca4300843c8936ab049

    SHA256

    7a3010f41963b4839e8351dd1c4a6f61cca2ac4327a43bb92d7da35b134d6453

    SHA512

    f41ec3ef849abe4f996ec901521b15f1b6e4ad319e084c8c2b14671d9fc764fb131590ead33da7dee39cb053c4e471132507489ab7830022778bbd960b68d2a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95d0166a7a243eb787a4926634b4107d

    SHA1

    cc5fe37e4bfb5b70235456ecbec6edb669683374

    SHA256

    d1cdf38d73dc571065a9694be73297341a9bc3947ebd517ab174e45b96841f2e

    SHA512

    98120c33c3d911c1ef8c10ec713b18edbd6a5cd6499d7e8acfc555dc4bb5ba59ea244458eee06e049968f44830a6c3d470965ba28bdc773082a060cc6943d5f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47dd161f1b113b8b96e9083caa9747e9

    SHA1

    ed8b6bf9d2e38aa1918b6283a70cb7d670147733

    SHA256

    8ba7987d9c37e7728dacbfe6ff892767b60d9d07106800c3e2fe2331bfaa60e2

    SHA512

    5cc4e2c1f2f2b622d946fae0c07107cd31a2bea4910b953e15aa21fc16288a561f95c5659b5018ba78d3ce79c3e5c988422c741050c19ae61fc6193b89f73c33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a6e5c7aba934cdc3c2571594834a64f

    SHA1

    15ed5709a09045f9574a7251b67f212e8c5e7ada

    SHA256

    ed93b8d7e0882bcfd9106a8ed57227d45b2db90816f47a8e211a52915872fe2d

    SHA512

    7278e5982c03f69769ab1de9fac3da95a630b92174990a85719b9e5c8862312f98ede1dff4f4029676e85b758bf0fd6ddce580dfefa7911d267aec90a43ece31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7f786e44663c6bbd8c507db3bd6ea71

    SHA1

    3202e466d11019b7c4af3c1525142de8255c72d7

    SHA256

    88d8991a3e69535d1b2639b541d0d7175724dc39a88f200a66f2a8032656c751

    SHA512

    4f362dc25c869bfcf68fc83be4d0e8f30577892e9609e7809f28bef31283ce7d713bed84a51dfbe527d9eda983360febb8847804170cbad36c6e0d4f752f7bde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    882d8bc820e5f0ddb7e386b3a19b37f2

    SHA1

    1de51f1f72694f28ff6fb518b6f21d03bbd204ab

    SHA256

    3e01c1a2fe4da5e568aad5c9a9668395b513ed6362f460df3a02051e587e5905

    SHA512

    47558378a137798ec753970544e8b0c094419a3f8c665a68b65dc8f38191566d8f181438509174a03980a6670c643091d753b4dc77b5a7d45ad06a555e73daa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbe9d0e76456650a91f1e98458af5b92

    SHA1

    e317a3af6f5e64c1a37f13552c93a89114b49ed2

    SHA256

    4c518054f6642452d625882b7400329fe8b464e13024ab1978958dc9e13b4e67

    SHA512

    79f682300cd8282bbee93505d91cde499695ebac2d9db34debc31df135cb5dd6b9fe84285639bba5382aa85be798e3146dbc005b2e450afcf6552e8280d75156

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3631390c28e7df38f22c185f11c903ce

    SHA1

    9b340f981a1c22a5c4a0c302678fb08bd4ebdd1a

    SHA256

    3adcd3345b98cc1a3cca0326ff0d082c91c4db4b6b3a87fa72bb23591c2b788d

    SHA512

    21a9a1a01bf82e88f951fb7452cca010539df39b7abcac2a4d309d79619d753af526ed7f78ef9be57d15da682e1b9e4f8051ad6230de5d28e84e5715cb2102a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e875229860d1569c1413cfc71700bac4

    SHA1

    f8cbaa60744c1ada96ba28f5471c42d2ad487315

    SHA256

    74d2aaf22cb56880f3dade8d2cf9d50b50d800fdfcaae5db2cf0ea1ea026b3bc

    SHA512

    6ed79bb58e81f3a9ea76d9e9ebd56c5ad4f4a9d6cf11d6f9ea43a8e1fc0ff9ae8448ea8d11cd072373471955c58e5d6ac513ed21270002472fe14c6a139bae40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5443a8d45914ddf412bfc4d8cd3f79eb

    SHA1

    4fdf5d9c77fd8f9ff616ea79fb5f383a337042cb

    SHA256

    567a39e3464c80170f3092f2d5213913488084952edbcdaefaa7f98ddd10297c

    SHA512

    6182dd80bdcff7d516ddfc290c2fda12a7e042c4c7e5dc62368333791f5ac5035e4bd5b07268005245de888dca841cdfb427b222667f6bcac40f6476faee7f2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    806be49ba39f83cc80c097f8cf4b8542

    SHA1

    6f9865d69160d697a7619db09c99cbe5b718f069

    SHA256

    aa2054101e2147fcbe53696cb683c0fbc55c087c84bb7cf5b89beb063395d7cd

    SHA512

    dafc6cb27d39310e54a7e724a2c1ccc79afebad2bd14e3edb312e1d85450a9f5d490e6bb41fa443d56f77ec940e8ceb705b617467602fceab89444c81711af69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99ff8b697b26e040153513e3a537e32e

    SHA1

    c2a230f45d7bfaf3729e0d25fc17fadeb19f505f

    SHA256

    d0e51881a70dd4ec7bb9b8925afce01aaf82665e21a374d55b97631ea5fc27ab

    SHA512

    25ac1bc856973b9cb5da8017c7769f7d1588ec36a1aa946656871190ebef80c3c203a567c2fd212f4dbf659dfc7ca3db748ab25e01c2ca63926410e3bf97c218

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d769d9aafd001192ff7d12ebdf8e9339

    SHA1

    5c6fb8d5eb532acc477247c94bdb63b7050cfb5b

    SHA256

    6fff855ad6b06a4245091b1a2c8e2e28e7342e4f408a53b683b4ee8fc0d629a2

    SHA512

    d478ca04f1b27fa237e6f4c7de5f813beef9e46c478614dcd8349d834716f13ea151c5d9393900d20d634895d5aa20d1d3321294b5e1487c21a087efb38b71e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2ce1246f3e15d54628ff7758bdf3d9f

    SHA1

    167fcd705f30f7cca2a8f4970c41bc18a2905ec8

    SHA256

    78a6eb199787fa898b219b9447966af61ce6cac76285854468463e2c011b83ff

    SHA512

    55286b24dbc2490a17fa88a1bca56d25d5a6cbca2cf726a337c97d4fc5d184789d29063356093f5eee4d307b9180cb2882e86e302ed5a1eddc94c1ca163a123e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc273eb00029144524c5fc450f5995a3

    SHA1

    32f1d10020ee5924999c73e1c1c8ad5da562d805

    SHA256

    2a83f91a395b1450959ec02ba7f47dce8bf4bb1502e48485735a1479573c36a7

    SHA512

    d459e7c65829ae2a9523451cf4c098873c9118e32635d1dbadeaa92d299225ea03f16efa226ea2b2331ac719bf3bb0d2ac60c129afc2a626d562e2e979cf44c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7c591d8feb7a8241846311b11292247

    SHA1

    c557ec744f82f197323b9fdd40ae4a6e9db9af5d

    SHA256

    8c1012867a665cc3288d5360622ffe46e1787c9904a5286da8159d1cb8f47c9c

    SHA512

    a0f401381df2cbf047c83bdbe3f6433cd57c65e0199c22425936334f6e9f9100d107e9cd4a9df5c4dc29b53aabcd2071157ceff8f7fd73f4311dcd55b798ba87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    625927e9039631f0f156a6edf087f938

    SHA1

    6ad4e996241ca9dfc5f53dfadb0502c9f9903c9e

    SHA256

    68fbf096fd9201218db6bb4e9c407bfb694ce0009e1d32279c53017e0c0628c6

    SHA512

    5e8a5ef2ac8ed9e1436743d3ab3c34c7238f89418bf052502c15677f40fd80cd522e6bc85f3678b28ca94207c67182f0c79d2968d7b8fab60d7622ebecebb412

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    815b29a2a4d0eb379b5104e620f6d4e0

    SHA1

    b5baff6ecda88d9739d25a430124eb62ce68ecc2

    SHA256

    551791d21b8932d7413a45bc90d1ff4b06dc752bc5131a33586db2f587351027

    SHA512

    a21672b4d54cd9894fdb44260f1bb28f7d8c233866deb71d36939c2189ac9709cfedb65f88418dd6ea27dd0ee2b9af0e00010abe6d6faf714617a4afac74bd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5ddbc115cb5daed03211070104978ba

    SHA1

    09317b86ce4c4bd42d03f3d46ebec65e0021eeea

    SHA256

    0c5ff0710dd7c46c686ba861bd3b373174193266771bccb9c0913faa462cac01

    SHA512

    0ad9f625116e92e9fd45b821a088f04bc66e8f345fad9721f833639862afa891ac065b9b08504c9280cca443b23d1aa051a1cc277404f841a5f407ce11d75eeb

  • C:\Users\Admin\AppData\Local\Temp\Cab43F6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4502.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1956-4-0x00000000001F0000-0x00000000002FF000-memory.dmp

    Filesize

    1.1MB

  • memory/2764-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2764-0-0x0000000000400000-0x000000000050F000-memory.dmp

    Filesize

    1.1MB

  • memory/2764-3-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2764-5-0x0000000000400000-0x000000000050F000-memory.dmp

    Filesize

    1.1MB