Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe
-
Size
312KB
-
MD5
02dcad2dc67e6808fb7eab1bb84ffcae
-
SHA1
f15eaa4e8115abed28f5f53ec59d38995a066437
-
SHA256
5dfff5ac350d6e51a5ec28fe728d9c918a1f5882241c6660aa303d4dae0ad5e4
-
SHA512
601552ee1dd7669dbd76439bf25cc592c19b715297e17d0e017d8b751753e255561296efa69fceba6ce82f06333aa3b4ae93fa2697bbad041c0dac797ad0f3f5
-
SSDEEP
6144:j80Mh2tKu20EIixqjqEwS8C3dbzmclGkpYRMcOqwpfYqFSV6T:/Mh2tk0ji0FwS8KlGkpnBHpA0SV6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2764-5-0x0000000000400000-0x000000000050F000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
Processes:
02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exedescription ioc process File created C:\Windows\SysWOW64\FieleWay.txt 02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exedescription pid process target process PID 2764 set thread context of 1956 2764 02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe IEXPLORE.EXE -
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F293B0E1-2EBE-11EF-8F67-D62A3499FE36} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425020179" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1956 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exeIEXPLORE.EXEdescription pid process target process PID 2764 wrote to memory of 1956 2764 02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe IEXPLORE.EXE PID 2764 wrote to memory of 1956 2764 02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe IEXPLORE.EXE PID 2764 wrote to memory of 1956 2764 02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe IEXPLORE.EXE PID 2764 wrote to memory of 1956 2764 02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe IEXPLORE.EXE PID 2764 wrote to memory of 1956 2764 02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe IEXPLORE.EXE PID 1956 wrote to memory of 2744 1956 IEXPLORE.EXE IEXPLORE.EXE PID 1956 wrote to memory of 2744 1956 IEXPLORE.EXE IEXPLORE.EXE PID 1956 wrote to memory of 2744 1956 IEXPLORE.EXE IEXPLORE.EXE PID 1956 wrote to memory of 2744 1956 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02dcad2dc67e6808fb7eab1bb84ffcae_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a150e340145463b9f52dfebf0e327c92
SHA11d9a0dbbd2a9bdb3feb71ca4300843c8936ab049
SHA2567a3010f41963b4839e8351dd1c4a6f61cca2ac4327a43bb92d7da35b134d6453
SHA512f41ec3ef849abe4f996ec901521b15f1b6e4ad319e084c8c2b14671d9fc764fb131590ead33da7dee39cb053c4e471132507489ab7830022778bbd960b68d2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d0166a7a243eb787a4926634b4107d
SHA1cc5fe37e4bfb5b70235456ecbec6edb669683374
SHA256d1cdf38d73dc571065a9694be73297341a9bc3947ebd517ab174e45b96841f2e
SHA51298120c33c3d911c1ef8c10ec713b18edbd6a5cd6499d7e8acfc555dc4bb5ba59ea244458eee06e049968f44830a6c3d470965ba28bdc773082a060cc6943d5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547dd161f1b113b8b96e9083caa9747e9
SHA1ed8b6bf9d2e38aa1918b6283a70cb7d670147733
SHA2568ba7987d9c37e7728dacbfe6ff892767b60d9d07106800c3e2fe2331bfaa60e2
SHA5125cc4e2c1f2f2b622d946fae0c07107cd31a2bea4910b953e15aa21fc16288a561f95c5659b5018ba78d3ce79c3e5c988422c741050c19ae61fc6193b89f73c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6e5c7aba934cdc3c2571594834a64f
SHA115ed5709a09045f9574a7251b67f212e8c5e7ada
SHA256ed93b8d7e0882bcfd9106a8ed57227d45b2db90816f47a8e211a52915872fe2d
SHA5127278e5982c03f69769ab1de9fac3da95a630b92174990a85719b9e5c8862312f98ede1dff4f4029676e85b758bf0fd6ddce580dfefa7911d267aec90a43ece31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f786e44663c6bbd8c507db3bd6ea71
SHA13202e466d11019b7c4af3c1525142de8255c72d7
SHA25688d8991a3e69535d1b2639b541d0d7175724dc39a88f200a66f2a8032656c751
SHA5124f362dc25c869bfcf68fc83be4d0e8f30577892e9609e7809f28bef31283ce7d713bed84a51dfbe527d9eda983360febb8847804170cbad36c6e0d4f752f7bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5882d8bc820e5f0ddb7e386b3a19b37f2
SHA11de51f1f72694f28ff6fb518b6f21d03bbd204ab
SHA2563e01c1a2fe4da5e568aad5c9a9668395b513ed6362f460df3a02051e587e5905
SHA51247558378a137798ec753970544e8b0c094419a3f8c665a68b65dc8f38191566d8f181438509174a03980a6670c643091d753b4dc77b5a7d45ad06a555e73daa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe9d0e76456650a91f1e98458af5b92
SHA1e317a3af6f5e64c1a37f13552c93a89114b49ed2
SHA2564c518054f6642452d625882b7400329fe8b464e13024ab1978958dc9e13b4e67
SHA51279f682300cd8282bbee93505d91cde499695ebac2d9db34debc31df135cb5dd6b9fe84285639bba5382aa85be798e3146dbc005b2e450afcf6552e8280d75156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53631390c28e7df38f22c185f11c903ce
SHA19b340f981a1c22a5c4a0c302678fb08bd4ebdd1a
SHA2563adcd3345b98cc1a3cca0326ff0d082c91c4db4b6b3a87fa72bb23591c2b788d
SHA51221a9a1a01bf82e88f951fb7452cca010539df39b7abcac2a4d309d79619d753af526ed7f78ef9be57d15da682e1b9e4f8051ad6230de5d28e84e5715cb2102a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e875229860d1569c1413cfc71700bac4
SHA1f8cbaa60744c1ada96ba28f5471c42d2ad487315
SHA25674d2aaf22cb56880f3dade8d2cf9d50b50d800fdfcaae5db2cf0ea1ea026b3bc
SHA5126ed79bb58e81f3a9ea76d9e9ebd56c5ad4f4a9d6cf11d6f9ea43a8e1fc0ff9ae8448ea8d11cd072373471955c58e5d6ac513ed21270002472fe14c6a139bae40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55443a8d45914ddf412bfc4d8cd3f79eb
SHA14fdf5d9c77fd8f9ff616ea79fb5f383a337042cb
SHA256567a39e3464c80170f3092f2d5213913488084952edbcdaefaa7f98ddd10297c
SHA5126182dd80bdcff7d516ddfc290c2fda12a7e042c4c7e5dc62368333791f5ac5035e4bd5b07268005245de888dca841cdfb427b222667f6bcac40f6476faee7f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806be49ba39f83cc80c097f8cf4b8542
SHA16f9865d69160d697a7619db09c99cbe5b718f069
SHA256aa2054101e2147fcbe53696cb683c0fbc55c087c84bb7cf5b89beb063395d7cd
SHA512dafc6cb27d39310e54a7e724a2c1ccc79afebad2bd14e3edb312e1d85450a9f5d490e6bb41fa443d56f77ec940e8ceb705b617467602fceab89444c81711af69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ff8b697b26e040153513e3a537e32e
SHA1c2a230f45d7bfaf3729e0d25fc17fadeb19f505f
SHA256d0e51881a70dd4ec7bb9b8925afce01aaf82665e21a374d55b97631ea5fc27ab
SHA51225ac1bc856973b9cb5da8017c7769f7d1588ec36a1aa946656871190ebef80c3c203a567c2fd212f4dbf659dfc7ca3db748ab25e01c2ca63926410e3bf97c218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d769d9aafd001192ff7d12ebdf8e9339
SHA15c6fb8d5eb532acc477247c94bdb63b7050cfb5b
SHA2566fff855ad6b06a4245091b1a2c8e2e28e7342e4f408a53b683b4ee8fc0d629a2
SHA512d478ca04f1b27fa237e6f4c7de5f813beef9e46c478614dcd8349d834716f13ea151c5d9393900d20d634895d5aa20d1d3321294b5e1487c21a087efb38b71e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ce1246f3e15d54628ff7758bdf3d9f
SHA1167fcd705f30f7cca2a8f4970c41bc18a2905ec8
SHA25678a6eb199787fa898b219b9447966af61ce6cac76285854468463e2c011b83ff
SHA51255286b24dbc2490a17fa88a1bca56d25d5a6cbca2cf726a337c97d4fc5d184789d29063356093f5eee4d307b9180cb2882e86e302ed5a1eddc94c1ca163a123e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc273eb00029144524c5fc450f5995a3
SHA132f1d10020ee5924999c73e1c1c8ad5da562d805
SHA2562a83f91a395b1450959ec02ba7f47dce8bf4bb1502e48485735a1479573c36a7
SHA512d459e7c65829ae2a9523451cf4c098873c9118e32635d1dbadeaa92d299225ea03f16efa226ea2b2331ac719bf3bb0d2ac60c129afc2a626d562e2e979cf44c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c591d8feb7a8241846311b11292247
SHA1c557ec744f82f197323b9fdd40ae4a6e9db9af5d
SHA2568c1012867a665cc3288d5360622ffe46e1787c9904a5286da8159d1cb8f47c9c
SHA512a0f401381df2cbf047c83bdbe3f6433cd57c65e0199c22425936334f6e9f9100d107e9cd4a9df5c4dc29b53aabcd2071157ceff8f7fd73f4311dcd55b798ba87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625927e9039631f0f156a6edf087f938
SHA16ad4e996241ca9dfc5f53dfadb0502c9f9903c9e
SHA25668fbf096fd9201218db6bb4e9c407bfb694ce0009e1d32279c53017e0c0628c6
SHA5125e8a5ef2ac8ed9e1436743d3ab3c34c7238f89418bf052502c15677f40fd80cd522e6bc85f3678b28ca94207c67182f0c79d2968d7b8fab60d7622ebecebb412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5815b29a2a4d0eb379b5104e620f6d4e0
SHA1b5baff6ecda88d9739d25a430124eb62ce68ecc2
SHA256551791d21b8932d7413a45bc90d1ff4b06dc752bc5131a33586db2f587351027
SHA512a21672b4d54cd9894fdb44260f1bb28f7d8c233866deb71d36939c2189ac9709cfedb65f88418dd6ea27dd0ee2b9af0e00010abe6d6faf714617a4afac74bd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ddbc115cb5daed03211070104978ba
SHA109317b86ce4c4bd42d03f3d46ebec65e0021eeea
SHA2560c5ff0710dd7c46c686ba861bd3b373174193266771bccb9c0913faa462cac01
SHA5120ad9f625116e92e9fd45b821a088f04bc66e8f345fad9721f833639862afa891ac065b9b08504c9280cca443b23d1aa051a1cc277404f841a5f407ce11d75eeb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b