Analysis

  • max time kernel
    117s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 15:08

General

  • Target

    748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe

  • Size

    308KB

  • MD5

    748fca4ee95f6ae348f49062cfd61f67

  • SHA1

    356fe62222cbba91bc0654f496766948cfdbde43

  • SHA256

    5e41782b105ee6f9ecf06a3c8aee4f35306a7f1b2b5940d48b729ecd835a3a08

  • SHA512

    942cba4c267556a506eed66dd239205fef8f24b46928b3e4da38373f92d285332d2b3e5234b967a424d0046c292a42173eec4b480744a8ddbc88b3f2c976004c

  • SSDEEP

    6144:1eBeMAugV60uU4EGkgb4RysJ/yQQa6RbCnYrzGAHxW/ffm:1b85Pzqys9yNaYbG0xk3m

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\748fca4ee95f6ae348f49062cfd61f67_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1248 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3074a3a8e469b6d65cdea5941d891173

    SHA1

    cbefaf6cac39eaca3e00c5c5f62f49bbda926c18

    SHA256

    d7ae73628b1b04cf267fd83cfc9435686e27b7156be4ad8650d6413293969268

    SHA512

    5102bcb063fd5a21acac59f88c335b073b11c91baab563c7c6453a8463674859033e158e0c4fb6a22b1c358b56835668bfe3578b631ccbf74fb665cada116e6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    258cf4d1a848a9d804e6e1fc0bcf1996

    SHA1

    749b8ace9f4f4ce9016be176dc011c07487137d3

    SHA256

    ca5ca5dc98a78923b86c4bbdfccb8b4b81bd72249c47b52c1d3d6454ab23e354

    SHA512

    81c6153d418ee932acac7fb897b02e641972ffa0d014027d99a2da528502d95de4838504b25e3059a68127a9b82642ba48b69fa8f6168857c94ff6438df7fc60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f321c0f041a35d29f640f48f95efe15

    SHA1

    8413e6fb0573f7a2ce13a299e5b3234bb05078b9

    SHA256

    788fb7f5715f3003f6b42b7ae8ce90add50b7aee407020e629e672177b0e557d

    SHA512

    a11b54400a4c5baf5a36b02caedbc4b320061526abce809d6dac6c2ea44ae01bb4e4de98651c9316e001ad83be1b70f5e50708da11392d5cb29c4baa816cfeae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78960bccfb2795662abbb203cd36bc47

    SHA1

    bf0f63f26ac7fdec2ff8d8247c4e5c33ba0703bb

    SHA256

    10141b6f13c903084a1eccb27feed03c48e1f5d9208d910e5d2fbc6d7581beea

    SHA512

    0ceacac660b8e03e8afc0295d5f16cac267311efbddeaf19fd8cbb0ca261b464f2675d387607998c72d913eeb0fbc39a27c274a1b70352f40bc2e984e225da8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ddcd42095ac741330fcd95eaf877357

    SHA1

    14726228ac84218cc640c41f1eb96dd28feae320

    SHA256

    8097fdb113eb65e92a50b18b31d859d8f65c308db8c7deca5f31bd82e9b526cc

    SHA512

    f4b96a3284be8dbd4e2b3b49f45c73ca546bb5f5150e8b8e2bffaec862c207986e8dc4f235bc3414dc1a464e5d89cfe9e415b2038aae950a0d832c6ee6c57eab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b472257a00d3d4b5c92a6f88b499105

    SHA1

    bcf187187b674514607f74ea70fb51d8ccceabbd

    SHA256

    179ce431edf6eb92171674db8c1a84dabcca6f6fc111f644aa56b9f85f00a128

    SHA512

    c99ed18f2361d2acd284d00ead60f54faf9243466e895a226b76d99a10c33b206e529f14349f453b35d7ac90f589fa5f4f7ca14fbf3cfd24ab38040bd490f0e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2dc49ca0fb27ac0df35816ac2d015edb

    SHA1

    f4f99437fbd9f1abe6478cb076a7dba81145e143

    SHA256

    5cc1d8053cc114a1637642219d80ae19389c21dab90278e309f78375b0d3037d

    SHA512

    530be2e09d9c678a0c54513cee4519ce1894adf036c40bbe2ac14f2794e8ef883d066e74ca90fe6d470043a4d434a6c7c068accd6c5299f407ccfb38bb10e3e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf202e652192f6ebd8850470ef46a541

    SHA1

    98b4937076ad3814e12b878790eefb4b097a7524

    SHA256

    fe730c611b75bc882b0511d3657d4c7eaacf2fcb650cb822e5d2286a4a5a0eef

    SHA512

    1aeb7decdb180d26cd3d195739051615cfdbb754dde2e4dffcdbf7015828eda647ad96d3407655c6e4671ee555ead8cad0f66718489bd78a9ba30913b54d7a22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27e304fc3b52e81db06b8398dfbfeb09

    SHA1

    12136146a12375981da77fd2e737b615f7ffecc2

    SHA256

    c9efe97b7fc79e932919266a3036be91ef419df8fea6c7157c96f478ef795bf0

    SHA512

    e973c2dd554d7db6c8098f726ad0d6dc45fc2dd773f00836f72caac09899416c764540e260f7d811d67dcba41d88ecdbb188b49fcc93c8f709832aeb8da1cc11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eac509b6281c3ce6ca54f17ff9dc2a0a

    SHA1

    434e86890984582d24fac63385a5438a622ccbb2

    SHA256

    d8c03f64a45f04301241133493b8679b7a1a53fd16371d3da480d1272f3e64be

    SHA512

    6b4d4f475f72f73f9b10f9afce97b265f4c31cb6d44dcc80b72a03aa952b12ea1e340a2acc8777a3dffd5d5ced7ea950bb7e299454ee3274ebf95828482aaf36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72d00e1ce7710ed2333e13d84cf1479b

    SHA1

    1ab1d0c3957ec640e8793c48dfb750cec73b5a4d

    SHA256

    5a32854427d2d91ce5a630d662aa7fbbdf4034913e32abd5c74e7fb35a5e81b3

    SHA512

    a6f3c658df64b5edee3a8652413efd5681e5b1c6a131e12f3faf5a7f37dd7ba3fc4c5cb71e9def2d68d9c96522a55deaae688e2d849142a609227478d3429da7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ace9602d56169efcdfb483f88001e658

    SHA1

    ea66100372ebbb7fed61ac1b8e6d4dea68c8973d

    SHA256

    5120a920b868d5426c13563825f069823bd1ff7838fe6adeb980ef36c5c97a92

    SHA512

    42eac1231b25c87e21e1296aa4cb1e79617d98ba28db8203ef77e566094580a6b0e4bc601925f4f617988f9e6464232ed725bf76653a8b787956e62009a65dd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    873a4795b9de3f235c1f40e54afdfc23

    SHA1

    042c68b3cfff7eddb89432a333d8cee271053ae7

    SHA256

    2b9aefbdf947ed6b9f8ad0fd2c85addac2ae1864bc4bc1d323ad0e5c780b76b9

    SHA512

    f861151cf39cac1082b9532387d614edf6418283333d823db2ca23ac90ea44de3b450b5f1f4f126a667720cbe5b2b413a85e94628b09109165b7519a3283548e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a37430adf5d91b9a684093a7ef61d58c

    SHA1

    f815d7da803bd348ed41b9bf785e8ea0e3da2186

    SHA256

    1cbcc98de5d2d25d7f2a358fd51df38d6c7d68421f9eca0ae0f8d2877a11465d

    SHA512

    ece14e412f0e21d4a504103eba6e780a568bcd4370f178b211b69f06e19fa81cb7a53841d0bfe93f3e6d3892d0b08c4815552dcd64674d605db191409c82a00e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d854f5f633a36f9d195749645696920d

    SHA1

    b10951d5efd127889a0a52c4033565e1cfae1c4f

    SHA256

    9734ee7f7e8bc7d161ce3c7b7c3330961b659e7845e219792b8d22c5d26afc3a

    SHA512

    97c2093afb56248f7bf26cd3aa6861835cdf470db25e3b331f5888a35249f79fbf4195df40008ef89b909cb2feed046fdbdf60d6410da78f0bedebadacc90a61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa6dac0ce41d6370edfa790f3d7f0edd

    SHA1

    66b03677b038457d54e2ec31976fa358e2707736

    SHA256

    e9b9ebf58d2e1c09d274fae4e9c3ef71cd89dd7c28369beedf057f741eee8b2c

    SHA512

    f950cac4ce074ee4eb8c59ebb2498d00790cf931c158c5404f1475b8f54be5855e48fd2bc4032685282187bb700c09ca85fb3b7e55781d667ae1039a65d84fd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f20b4cf48743c1043ba12fcabc31d772

    SHA1

    21741642be3078a8761bc7c759d8210c3a75d429

    SHA256

    931776feb01a6f08fb0d41f64ea886c76d06495cbf5f1338dce149b0cca6f9c0

    SHA512

    d0ff8305162aa4c3c1073e98a0d340799a45df0fe9d72cc28cc60c3fb4dd166e3c876f3abefd7a51051adc3965c4ae5e458034d3497cbb065c950e607c906cbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45e646a8f209b881c634750f51200580

    SHA1

    0ff34a1d0a36cb79a0b4ea8045272b7f162c12e7

    SHA256

    a81ec8ec7e8806cb38a8bb9efab9ddc458aab18fbee9f78e38f4a7d31ded5948

    SHA512

    2e8d3cb2d388c6209a76e9fdfdd8a657cac30ec72135e1e5a667415bebeab534ecb10f6ce078f86fc41f1da038aa3731f56d27734ecce9312d51461599a9a8d2

  • C:\Users\Admin\AppData\Local\Temp\Cab27DD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar28EC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1248-4-0x0000000000270000-0x0000000000384000-memory.dmp

    Filesize

    1.1MB

  • memory/1876-5-0x0000000000400000-0x0000000000514000-memory.dmp

    Filesize

    1.1MB

  • memory/1876-0-0x0000000000400000-0x0000000000514000-memory.dmp

    Filesize

    1.1MB

  • memory/1876-1-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/1876-2-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB