Analysis

  • max time kernel
    117s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 13:25

General

  • Target

    227fbc9e0fc268c5b5bc11620f427e80_JaffaCakes118.exe

  • Size

    718KB

  • MD5

    227fbc9e0fc268c5b5bc11620f427e80

  • SHA1

    6002c7e7bd4bd693a389907292dc9332105705b7

  • SHA256

    0e692fadfb06c91d660104ada432ca3268a7c11faaccc6f7b015c47f8dea887c

  • SHA512

    d2fff028c4f51fe85eba673cc70304133421e89b01c6de26ab2b85694061aa106f19e1143e2fd53662730e6448c633c1c8c7eb2d7261e4d536494cd4aa2d0932

  • SSDEEP

    12288:ZkSFizeGD1h2bGZCS1JHT/LmC3Fo/0F3Z4mxx+DqVTVOCS:ZkxjD3pZ/prt3FosQmXNVTzS

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\227fbc9e0fc268c5b5bc11620f427e80_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\227fbc9e0fc268c5b5bc11620f427e80_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\3.exe
      "C:\Users\Admin\AppData\Local\Temp\3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe
        "C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice47.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2388
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupDel.bat""
        3⤵
          PID:2480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\SetupDel.bat

      Filesize

      122B

      MD5

      c6cbf263f5edd10cbc32e5ef40b33d9e

      SHA1

      0073d4bee85f70754c2f6257a32b03a72007d75b

      SHA256

      35939646786fff9edb272c0e6727827b7254419b451a3983c2fd5d7b04bafbad

      SHA512

      61a3ec28a835b9b6c1cfe0cbe8d62972cb98032dad08cf06934dea8e6d7f0d2cd237084e29b201843870ce414590c07a4a7b52819d3d733ed8d99b5387219351

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      91b2d2372c64f8ae3e73f8d253de2a35

      SHA1

      a75faa3bed7dc70b93eb7a0c883dc578a666e839

      SHA256

      18df0ea7fbaeb57aa4f04e9f6e820a9f446ae1f04c4d9d5dce1a3d6e206c9929

      SHA512

      d17832172a2ff8d766d122d473e4b20a889e2aba9707e398a8e0f2cf84bf23561f34afdc7c3320c1451ffa7a6fbf055c6b8fd0d7a2288205fefef005fa70d8e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e4d736bb850a1255fe4161ef367acee4

      SHA1

      08b87eb4a1cb7c11d8f4c2bae6b7916352f10808

      SHA256

      185d11bfae316811fdd0735ec53ad6e713b6ce063f113079d4237d8c665efdd6

      SHA512

      a7ea2e122d4afa1257344713e21bd058ccb4265d8a2dd9a182ffcd842c64e10cf761cb2b27a44df65c20fcc93997e67ed518cd6312fcd9592aa0700a17a082f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      815cfab63d0bf80633c8b47a286bdb5b

      SHA1

      62c734177b2224834585c914c2eae73c7f1e911c

      SHA256

      bd8678ab491e27e2f70e2547493b0cf9db0d4375b4720f2d8b829c3654a16a20

      SHA512

      6a176e85f7c1cb4b515b417a5a66bb6b25fb07d21c94c55488e63d88749b501a2bf033181f93237b7387ec70ad7944a66fc21ddb917cae40e730d48e24043aec

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      126b64b63599b3b3c509b77b131090b2

      SHA1

      486355c6d04b53043fde2eebb8293895c0c608f0

      SHA256

      7fb1b2639661c8d7da57f41ee9045bde6255ecca9e798282e1f1a82d7693f01f

      SHA512

      2259c4e8ae0d1b286870f4d3a4cdec5f5f5cc0dcdde1cb87435cc473f8f212d5cece0d0b49c105c5535a5341eb611f30e586498509a57ea38f2d4e4b3b7b5918

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      95f7fd50d2b7574206a344afe3073ba1

      SHA1

      1bb00c8ddaff28c2322eb167b44190115600782e

      SHA256

      8faf4c6e3985e00cdd16f3ab4481e09772ec33fd5d721825df89e0c6bb394d9d

      SHA512

      c92db10ba932f7349de207f27366a3d27dc55ff1ee56aef5b1257965cd74fdabbf1ff7dbb378da3a2d149c42b032581d38773f149dda23c8cd7516aafdb742bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6a10facb3740a3998ccc4260cfa91715

      SHA1

      da0c09bd6a4686050827884b48d7d1d6b62c0fe9

      SHA256

      6d16bcf12127c32ada48e7a52fbb1fc151fafcf5c1a5edb41c996102464e0bc5

      SHA512

      4f0e5c1efbc670e7aaa4b597438e1dea24ed3016d0a9316820cbbce3d12e7588edf8b2926b1ee16375a95b1933904ac4b5763dc25f6b66352be21112cb6b9261

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7fe9abfb096ba7c995be6c01d37cc7c2

      SHA1

      a56f0c437ef8bba2991a2a40d4f7598cfdbb5735

      SHA256

      5f10c54514ca0a7d03ec8e382ec1cf6ee139df9da360eaff7dcdb03c0b936201

      SHA512

      653874a5d7474f13ad54c6dc2a354bfe9d4e0201f9f049a3222e28e6321e2516310c69acbbfe3eebd1d1f6b1ecc7776b17f80694eda950cb537f422417003276

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b9d670e9ef61900df63fc992eaf19e17

      SHA1

      78059c324225b27210345a1f4015bef50fb0e475

      SHA256

      b676013ae3378e2697fcfe4a1c2d39d086cb59b6d9366127c5678127a337d586

      SHA512

      b355d807d75614074400bcaac4a83d0925f3a50b5b4fb5499ae54c3ad927e6f746f82ffaa001b3a66eccceab04cb15f44558691af8ed668c5345fd3caef02cc0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7e865c06eb0e2a8591ce5623d2e51da7

      SHA1

      c0018b1735626ff499a631f73d43277f0d0c08b7

      SHA256

      789a1d1e748d2e800234517f201e2d3139a7bb603aaacda0831abc9d19192a69

      SHA512

      9bfa8bf6600aab988645cad6aff36c3ff2c746445350691b66e20183a7dcc7f84f63855ab627763beff65b870081306bbc026d5a20208a0f20562557a5700931

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7a632ff6f26bdc437dbf05dbc01470d5

      SHA1

      7120c53d1e724201c81412d1e28e3e97e178a54f

      SHA256

      60e543210ad7a76a1f2db1b9c41150049b053117a44f8b383335d30b3039ce6d

      SHA512

      fc7d8a348cb4d052158b455f48348876cbbdb37d49087b4750a84d3bdce921d2e52ae2ac404a744a13c4acb00c7e61650da06fbd82a578d9e9be9d2d0167239d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b3f4adb43e00bc6d756cc16e34496ba1

      SHA1

      4e94f41e0967729131fa7658ecea2ee0c95cc0d0

      SHA256

      391fcfa35c49d1ddcf7cd86712586da6a16e43307a7606094304f52567e4e4fa

      SHA512

      0649f579375c45473233d88c79de5dae3642ce293d12371063ecf5fe9ac5c0d02f0f6acf28e939b61bc2f8fb3d7c6fcaffe8a57a5fa8c4636fdf91e739f9cf84

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      88b76ef3913b0446f960920effa240ba

      SHA1

      eab24808482883daabbc728768874735cc840dad

      SHA256

      357f293339a3e661bd83b689ee97d41933ed651cf3fbbd0e5792e19170b2a762

      SHA512

      dcb72ccbe8ed6c1b40768c1ab0362b21930a3629a66614459bc1b937ac63c81974fdb0afdfe077ca1e367f3c48d7daf1a954b7aaecc263b716f66ec2309877a3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ddbd194e147caf69d31626e58bb360e9

      SHA1

      4ab6e3df210ddd576c2552f53ff0f4c9c48764a8

      SHA256

      68dd19cf4bfd9c125b300780b4e05a13e0c584b5d1f65a14ad4338f4eef3dfaf

      SHA512

      2b69c23685883105c415d5eaac0610951014ccd0f2b873c31c4ec9440cd1633c73137db79b22b8ccfa60eb5a3674fc9998b2b87eeba010a00fcb89b3bcc9c4df

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d11d5f884a323ad4085075d059bb1dac

      SHA1

      223c050905e1a2cc20912ea95175ed48a481e3ba

      SHA256

      fc21bc8ec84205726aa3d9e119fe5a7c8fa7736ac5a8020d2e20eea4848f477c

      SHA512

      4c20e32aebf0199c9e6ecc5048c3cca4cd2c6aa6f65949688f979c27c41efd83aafe954a0ed570953ae9ea41ebdbe29a02475a826bd769448bc19df5b42541d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      892d229b1ee357f953b586d64c483f7b

      SHA1

      65dfcb52a06132bc54002eeacd6b8653190aa522

      SHA256

      31dba516c1b2e77f10444142e69dfd3232ee05aed604b8633722a05d48e6f3f7

      SHA512

      1bdacb418195aee956b0b75c4a3fb9067eb1c3f4cf740d66aa40ffa6bbd99d2a00dd05be6c261e36174e0812f15db0707db2b3abd48c1e686fe3372c19eed94a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f6f373da450f19008de3a42a87c3482e

      SHA1

      e23ef3b4a7d3c9ae98072483bbd9f482829040a8

      SHA256

      8eb4b4ca14d207ccdd84a8ea5be592a71b413f54b620151e39f2eb2be732754c

      SHA512

      81b46c106048df2a432fe8699df71465dfe6670000c58eedcd16049fcfca2d0fe719022800f9143257aa5289a33a7057e6cb173698ae233ae5b2b482368811e4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e5a19ee7e85a2745d0967bd6ab7985cf

      SHA1

      2c8aece47e30bedffac4ee2464703562207b50bb

      SHA256

      5b15632414278b9b944a0a6ee039f6da604f9b158dd563b731a93a814fe436d9

      SHA512

      c7c50fbb6382f94c50e83eaeabbefc3bf7e41221d5626120bbd31e839daf0bdafee3d35391b52b89aefbc614f0793a7f18310ef78d33bc5c6be2e93d5505ec31

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d5a0c3698b1067a1a8333dc661cc779d

      SHA1

      96f0146d17b114063fa9bc58d0c9a8759c6d1098

      SHA256

      6816520227d0b3c119afb999dd36730164288d24e1734198f6ea4a0ff9d8cd7e

      SHA512

      1f3123d069804a5b80509af30f0b720caf0d64c0810babb479ebf7effe9433f31ae01fcc54b4f109464fdf8a204ce9372693abe9c9db1580b81b517658ee166c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      ac616a78f2c0dca86d5c894ea179754d

      SHA1

      0b19dadd4463806c38e43a0f5acfa1462a44bda8

      SHA256

      60e4d9da725ea19a4b204a115f37feb8c17714d1adc04dcf02007e24c0a25fef

      SHA512

      e5ea9728a42623d98e1a03e4a8e09d2c7344198aaae5e56dae2440d6163209724730a097419dc51109cc60c58165af00d5930e0e3f442f0f786aa3d5868b9578

    • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

      Filesize

      4KB

      MD5

      da597791be3b6e732f0bc8b20e38ee62

      SHA1

      1125c45d285c360542027d7554a5c442288974de

      SHA256

      5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

      SHA512

      d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

    • C:\Users\Admin\AppData\Local\Temp\Tar3411.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\3.exe

      Filesize

      704KB

      MD5

      740fa7acf08a0c5fd1dd85a421591c6d

      SHA1

      34c775ef9c2405cac96a80c9d39330354fed72ef

      SHA256

      03dc94588bd318d9b8c4faddee4de0e014c69a9a18531451d8380fab49d6ac72

      SHA512

      94c29eaabac1cfc0efce08723e6863e11e1c66837c60dbc1791dbf8b583736156886ba80e2844c97b853d19ba2d079786d41514a40318202049616f13bd20567

    • memory/2616-29-0x0000000000400000-0x00000000004B7000-memory.dmp

      Filesize

      732KB

    • memory/2740-28-0x0000000000160000-0x0000000000217000-memory.dmp

      Filesize

      732KB

    • memory/2900-0-0x0000000000400000-0x000000000050B000-memory.dmp

      Filesize

      1.0MB

    • memory/2900-2-0x0000000000400000-0x000000000050B000-memory.dmp

      Filesize

      1.0MB

    • memory/2900-3-0x0000000000400000-0x000000000050B000-memory.dmp

      Filesize

      1.0MB

    • memory/2900-5-0x0000000000400000-0x000000000050B000-memory.dmp

      Filesize

      1.0MB

    • memory/2900-4-0x0000000000400000-0x000000000050B000-memory.dmp

      Filesize

      1.0MB

    • memory/2900-15-0x0000000000400000-0x000000000050B000-memory.dmp

      Filesize

      1.0MB

    • memory/2900-1-0x0000000000400000-0x000000000050B000-memory.dmp

      Filesize

      1.0MB

    • memory/3012-37-0x0000000000400000-0x00000000004B7000-memory.dmp

      Filesize

      732KB