Analysis
-
max time kernel
117s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe
-
Size
308KB
-
MD5
748fca4ee95f6ae348f49062cfd61f67
-
SHA1
356fe62222cbba91bc0654f496766948cfdbde43
-
SHA256
5e41782b105ee6f9ecf06a3c8aee4f35306a7f1b2b5940d48b729ecd835a3a08
-
SHA512
942cba4c267556a506eed66dd239205fef8f24b46928b3e4da38373f92d285332d2b3e5234b967a424d0046c292a42173eec4b480744a8ddbc88b3f2c976004c
-
SSDEEP
6144:1eBeMAugV60uU4EGkgb4RysJ/yQQa6RbCnYrzGAHxW/ffm:1b85Pzqys9yNaYbG0xk3m
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1876-5-0x0000000000400000-0x0000000000514000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exedescription pid process target process PID 1876 set thread context of 1248 1876 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe IEXPLORE.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXE748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe -
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428175667" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E298D831-4B71-11EF-AEC5-4605CC5911A3} = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 1248 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exeIEXPLORE.EXEdescription pid process target process PID 1876 wrote to memory of 1248 1876 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe IEXPLORE.EXE PID 1876 wrote to memory of 1248 1876 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe IEXPLORE.EXE PID 1876 wrote to memory of 1248 1876 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe IEXPLORE.EXE PID 1876 wrote to memory of 1248 1876 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe IEXPLORE.EXE PID 1876 wrote to memory of 1248 1876 748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe IEXPLORE.EXE PID 1248 wrote to memory of 2712 1248 IEXPLORE.EXE IEXPLORE.EXE PID 1248 wrote to memory of 2712 1248 IEXPLORE.EXE IEXPLORE.EXE PID 1248 wrote to memory of 2712 1248 IEXPLORE.EXE IEXPLORE.EXE PID 1248 wrote to memory of 2712 1248 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53074a3a8e469b6d65cdea5941d891173
SHA1cbefaf6cac39eaca3e00c5c5f62f49bbda926c18
SHA256d7ae73628b1b04cf267fd83cfc9435686e27b7156be4ad8650d6413293969268
SHA5125102bcb063fd5a21acac59f88c335b073b11c91baab563c7c6453a8463674859033e158e0c4fb6a22b1c358b56835668bfe3578b631ccbf74fb665cada116e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258cf4d1a848a9d804e6e1fc0bcf1996
SHA1749b8ace9f4f4ce9016be176dc011c07487137d3
SHA256ca5ca5dc98a78923b86c4bbdfccb8b4b81bd72249c47b52c1d3d6454ab23e354
SHA51281c6153d418ee932acac7fb897b02e641972ffa0d014027d99a2da528502d95de4838504b25e3059a68127a9b82642ba48b69fa8f6168857c94ff6438df7fc60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f321c0f041a35d29f640f48f95efe15
SHA18413e6fb0573f7a2ce13a299e5b3234bb05078b9
SHA256788fb7f5715f3003f6b42b7ae8ce90add50b7aee407020e629e672177b0e557d
SHA512a11b54400a4c5baf5a36b02caedbc4b320061526abce809d6dac6c2ea44ae01bb4e4de98651c9316e001ad83be1b70f5e50708da11392d5cb29c4baa816cfeae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578960bccfb2795662abbb203cd36bc47
SHA1bf0f63f26ac7fdec2ff8d8247c4e5c33ba0703bb
SHA25610141b6f13c903084a1eccb27feed03c48e1f5d9208d910e5d2fbc6d7581beea
SHA5120ceacac660b8e03e8afc0295d5f16cac267311efbddeaf19fd8cbb0ca261b464f2675d387607998c72d913eeb0fbc39a27c274a1b70352f40bc2e984e225da8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ddcd42095ac741330fcd95eaf877357
SHA114726228ac84218cc640c41f1eb96dd28feae320
SHA2568097fdb113eb65e92a50b18b31d859d8f65c308db8c7deca5f31bd82e9b526cc
SHA512f4b96a3284be8dbd4e2b3b49f45c73ca546bb5f5150e8b8e2bffaec862c207986e8dc4f235bc3414dc1a464e5d89cfe9e415b2038aae950a0d832c6ee6c57eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b472257a00d3d4b5c92a6f88b499105
SHA1bcf187187b674514607f74ea70fb51d8ccceabbd
SHA256179ce431edf6eb92171674db8c1a84dabcca6f6fc111f644aa56b9f85f00a128
SHA512c99ed18f2361d2acd284d00ead60f54faf9243466e895a226b76d99a10c33b206e529f14349f453b35d7ac90f589fa5f4f7ca14fbf3cfd24ab38040bd490f0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc49ca0fb27ac0df35816ac2d015edb
SHA1f4f99437fbd9f1abe6478cb076a7dba81145e143
SHA2565cc1d8053cc114a1637642219d80ae19389c21dab90278e309f78375b0d3037d
SHA512530be2e09d9c678a0c54513cee4519ce1894adf036c40bbe2ac14f2794e8ef883d066e74ca90fe6d470043a4d434a6c7c068accd6c5299f407ccfb38bb10e3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf202e652192f6ebd8850470ef46a541
SHA198b4937076ad3814e12b878790eefb4b097a7524
SHA256fe730c611b75bc882b0511d3657d4c7eaacf2fcb650cb822e5d2286a4a5a0eef
SHA5121aeb7decdb180d26cd3d195739051615cfdbb754dde2e4dffcdbf7015828eda647ad96d3407655c6e4671ee555ead8cad0f66718489bd78a9ba30913b54d7a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e304fc3b52e81db06b8398dfbfeb09
SHA112136146a12375981da77fd2e737b615f7ffecc2
SHA256c9efe97b7fc79e932919266a3036be91ef419df8fea6c7157c96f478ef795bf0
SHA512e973c2dd554d7db6c8098f726ad0d6dc45fc2dd773f00836f72caac09899416c764540e260f7d811d67dcba41d88ecdbb188b49fcc93c8f709832aeb8da1cc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac509b6281c3ce6ca54f17ff9dc2a0a
SHA1434e86890984582d24fac63385a5438a622ccbb2
SHA256d8c03f64a45f04301241133493b8679b7a1a53fd16371d3da480d1272f3e64be
SHA5126b4d4f475f72f73f9b10f9afce97b265f4c31cb6d44dcc80b72a03aa952b12ea1e340a2acc8777a3dffd5d5ced7ea950bb7e299454ee3274ebf95828482aaf36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d00e1ce7710ed2333e13d84cf1479b
SHA11ab1d0c3957ec640e8793c48dfb750cec73b5a4d
SHA2565a32854427d2d91ce5a630d662aa7fbbdf4034913e32abd5c74e7fb35a5e81b3
SHA512a6f3c658df64b5edee3a8652413efd5681e5b1c6a131e12f3faf5a7f37dd7ba3fc4c5cb71e9def2d68d9c96522a55deaae688e2d849142a609227478d3429da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace9602d56169efcdfb483f88001e658
SHA1ea66100372ebbb7fed61ac1b8e6d4dea68c8973d
SHA2565120a920b868d5426c13563825f069823bd1ff7838fe6adeb980ef36c5c97a92
SHA51242eac1231b25c87e21e1296aa4cb1e79617d98ba28db8203ef77e566094580a6b0e4bc601925f4f617988f9e6464232ed725bf76653a8b787956e62009a65dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873a4795b9de3f235c1f40e54afdfc23
SHA1042c68b3cfff7eddb89432a333d8cee271053ae7
SHA2562b9aefbdf947ed6b9f8ad0fd2c85addac2ae1864bc4bc1d323ad0e5c780b76b9
SHA512f861151cf39cac1082b9532387d614edf6418283333d823db2ca23ac90ea44de3b450b5f1f4f126a667720cbe5b2b413a85e94628b09109165b7519a3283548e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37430adf5d91b9a684093a7ef61d58c
SHA1f815d7da803bd348ed41b9bf785e8ea0e3da2186
SHA2561cbcc98de5d2d25d7f2a358fd51df38d6c7d68421f9eca0ae0f8d2877a11465d
SHA512ece14e412f0e21d4a504103eba6e780a568bcd4370f178b211b69f06e19fa81cb7a53841d0bfe93f3e6d3892d0b08c4815552dcd64674d605db191409c82a00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d854f5f633a36f9d195749645696920d
SHA1b10951d5efd127889a0a52c4033565e1cfae1c4f
SHA2569734ee7f7e8bc7d161ce3c7b7c3330961b659e7845e219792b8d22c5d26afc3a
SHA51297c2093afb56248f7bf26cd3aa6861835cdf470db25e3b331f5888a35249f79fbf4195df40008ef89b909cb2feed046fdbdf60d6410da78f0bedebadacc90a61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6dac0ce41d6370edfa790f3d7f0edd
SHA166b03677b038457d54e2ec31976fa358e2707736
SHA256e9b9ebf58d2e1c09d274fae4e9c3ef71cd89dd7c28369beedf057f741eee8b2c
SHA512f950cac4ce074ee4eb8c59ebb2498d00790cf931c158c5404f1475b8f54be5855e48fd2bc4032685282187bb700c09ca85fb3b7e55781d667ae1039a65d84fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20b4cf48743c1043ba12fcabc31d772
SHA121741642be3078a8761bc7c759d8210c3a75d429
SHA256931776feb01a6f08fb0d41f64ea886c76d06495cbf5f1338dce149b0cca6f9c0
SHA512d0ff8305162aa4c3c1073e98a0d340799a45df0fe9d72cc28cc60c3fb4dd166e3c876f3abefd7a51051adc3965c4ae5e458034d3497cbb065c950e607c906cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e646a8f209b881c634750f51200580
SHA10ff34a1d0a36cb79a0b4ea8045272b7f162c12e7
SHA256a81ec8ec7e8806cb38a8bb9efab9ddc458aab18fbee9f78e38f4a7d31ded5948
SHA5122e8d3cb2d388c6209a76e9fdfdd8a657cac30ec72135e1e5a667415bebeab534ecb10f6ce078f86fc41f1da038aa3731f56d27734ecce9312d51461599a9a8d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b