Analysis

  • max time kernel
    70s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 15:21

General

  • Target

    96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe

  • Size

    293KB

  • MD5

    96a35777256b0ca9dffe94aa45b1f99a

  • SHA1

    cdc9c276979612b03ee92d48a63892ae0209e6c4

  • SHA256

    e9efdeb32f97783abfe6250b785d43fd1a38329d34d3bc13656cb37625820e63

  • SHA512

    54cd8262864a92f7384d0f8c55e7b2d0c4a1ef45855d47cb2089a2590df839bdb4643e772053acd99fc3f22d2f0b1054803dacd0ec9145ea0708a7e960322d31

  • SSDEEP

    6144:zq3qfVvOdaEAvID4sicwdRCms1h3Axyw4f1f:cqfxrIBivR01htfF

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\96a35777256b0ca9dffe94aa45b1f99a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2164 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae5474563241b2e552c3d908d235af48

    SHA1

    ff27a0b07971f40b5ed165ca493ca4481124a19f

    SHA256

    7f60e5fb23a0238ba4643bf39c42b3e218c65bb448706056c9e5912463f2db31

    SHA512

    ca89f4d55386d61eb63d492a5d81687aa891ab6f865589599779b0ac237ef65a867f32bbd7ca7c826104f53072c1b33ac1492fb6fca7e76559919be820ea5320

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bec14f9a7728bcc76d1c1c3ae6294379

    SHA1

    a4dd81970c6cbf03874854199ad93f2ee1d9178d

    SHA256

    bc06ca0c61e3ceb07f1bca997aa2ea4eda0a0298d4d2cedd4381a109faa0c23c

    SHA512

    b895b78b32d55cf77e55a1c5cb4a8fa2f93f0a8a283b994945ed0295e481d7588b9dbebd145eb47d695eb2b944516bda7cc8436aff030c652dca608a31ea4d39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e1d6f9b2d388b83415a72ed0da0209c

    SHA1

    954c3cb6ec419c7f5a951d5c99701e14a505adc0

    SHA256

    56a206922b77355da8c3487b5a322a33b7580435bb2106003bf815d354082f65

    SHA512

    41a710a6cc5b709662dfd27cc7aae8ad41ef1922fcd722cc226ef408ff589e90e8779d77c45353b5557910b324f780d2e08bf0ed1af1470ccd686be2da8f605e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a797e4c093971ede1d19102ab6bc46a0

    SHA1

    831aef8d74f8904afc4bd02b1cc525d198a5967d

    SHA256

    3fc007a6d83f9244c5b76dfbd9aa040d92a8d9d38824da2f32dbd5ee2f3b0c69

    SHA512

    7d2ab7b6f6c5128a83d8220d1e76d25c1934873c37d6f150072d28734a390db7394ae697dbdee48edf515e02655e19a19cfc59452254122cf7f432f99aed45e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a8f898943d33b53197eae6fa1bcbf1d

    SHA1

    678734332c51db29d3369bfb1672b31e013ca63a

    SHA256

    ce41a5f8a1e343f87632db87f8b45a81412a0a1a15712fc9dc66ad902e14ccda

    SHA512

    4b833f97d6206b5835f734d33e40c45145ee3f878bca25fd6fbef7b89f0052f7345bdee59a61333bbc25bd62986d459b9c7abacea6f86082b8f68d27c47009c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43c362632dacfb3ef6c8972efef2bf3a

    SHA1

    a1fed32ef1ba9943ebd209a415954a8dd887b030

    SHA256

    b76ed025f730ccc8b736c215222c196c7b44b0a138b37a910f644f5f63d2eb93

    SHA512

    b5b3060d95eb88ee76fdd6979db31a2b126ea54a8b30fcf1653dc4628e1b540cb386c94337a7fb722806736d272e1d329a104d88d31d2f44c881e93817354292

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96bbcbd8f429f36979276f1657dc6581

    SHA1

    a13be1583dcd2dac9abe964e382ae53fa954319a

    SHA256

    18ba7c43fc23ad7b22bf82b56c23a2fc4b95dc92897135499103dadfca5395e1

    SHA512

    40218d452aa5a79fa20554e819e62afcf197ca5988881d0bb0295dac7f4ebbaf06412a37e341a1f2e6eb2cdd1edb1cdbb26766803abcac67738c685c54cffae7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    752f823effb1b80a7c50ecd7dd8ea302

    SHA1

    b199dfa2acc8455e970adbad75dce0bc6207bb47

    SHA256

    a4f0fa12cd013a708f92cc806df0b65058ced0a7142dfa2bb05557250485163b

    SHA512

    ea799f7d27a73b222b89b00367615f56f89273c2dffe34e17cda7d8835fd0f0a8621a43caa3da3755c4880aa4763f035d0ab6e1613811b8ddc8f8010a3df76f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff70528328b11689292afbfc6853dab7

    SHA1

    59a082a073f4c213b6ec48599f95744e79788525

    SHA256

    5c71b1d950a1f3192f2764b3946241a3fb5743242e502ffabbeffaf0e892df7d

    SHA512

    5d306edbf197da6813c9d7e6a5f64404dea4b6895cd5f3249600beab37603a73c0ba9411f263518b1b6cd16fd028c62872f5cdfc0afac82b3c648eaf218e210e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d1e828f9850ee39803cd9a247b75ac4

    SHA1

    b58d2c73b3e7f9c21570b21769a0299a63d0cdb1

    SHA256

    a6b828e1081d8aa10256b2e34f8a764dfc7a4ebbb10e35bd7ee1b50ea05aa933

    SHA512

    be0d27e935aca6569dbf312562f21f1b83d86306b44f10f281822f18fdf206ddf41e6d12185545bc1e65a847bb1cf6796909d9b0913e1179c7c867043d6f4c05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8c87736fe4996cebb30c124507d6b77

    SHA1

    0b62049c262f45af141e60009ce7a1078ee075f2

    SHA256

    e2044ee68d10183086f614e1a9661a5c1714223d80778fbd30d4740b83cb32b3

    SHA512

    93edaa2b37cf6118abd46f7fabffdba60e456ef0dfe4ddf23792b9699d928e7fbaa01325b905fdc1d7db76c66d75b3cb383d49a596772c9b5be2da5db57d90cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82c874116c045d42ad59bef92b006ec5

    SHA1

    14c3310321922bdbf68eded381df3d476b364426

    SHA256

    a58a417ad7dec3c40d3fefb95f67a0c243d3795ba506f0151ad2179e758f9e04

    SHA512

    88f1a601b4c582435860812f2856f12f23000c575a39fb6ecba5e6f8e87b763342cc64185bffa948afcf41a4d736db1cea2b17b6d81deaa6b8a39fc4af345f8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89129329ef662af10fa4c6d32aec88c1

    SHA1

    cb24e284dc50bbf8be56064ffb47979bfded3f20

    SHA256

    acf270ba4541b484e039a4405360eba55ddc8783d9a39d60f66807b9eae10bb4

    SHA512

    eb5b1dcc02e32f11e583ef3082bac34575883cd6f73f53a148ba59c326a07b8de5fdc844a72c1af1ef03b3f9bef99d3785df7d1bed7ff44ee050807400cae199

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52f1863f512d8a73f5cb2c0cbcf98371

    SHA1

    7928a252e7cc500ccd2148283a0611c676b9398b

    SHA256

    befb7b1fc7a4871cc8dc5211f59083f4392b439486af30304d5c31296d62a11c

    SHA512

    f26bddab342815ba151bbf3404a8d926d25783396fe1fee926a2370d0ad5f9989c22d7344e704cb02b1451958b848cbae9c128884e03df1ca517aba70c7a16aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    042014417a076fbf1344f4a935b12167

    SHA1

    b19a408912338d5b3d606fa545ef8dcb53ac27d7

    SHA256

    28e7d772d7ce3ecd229dec2eba16e2474744dd9c2d30fa7f8035a40c4301fd9d

    SHA512

    674869733b8f189c29b7970776adb535833f9a495d994b2a602c33ee566aac3572ce6a059a5535b9d744141185b2bda9b5a0de434b24bd019aee7a7ecc3c6fa6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    732521b0eeffcd0649d564b6a3b19444

    SHA1

    16dff8002c690c6a0f8339b0685311b1d3332e31

    SHA256

    c8956cae45fcfce96421f8ef18a0015a074085758ecb13a46e13fc3dee33dcb8

    SHA512

    8675ca00660ec473ff3195da691a59960930f84e2fc016a9d5b909df6272b70ea7398d70460bff4a983ff17d5653e6948498d1b5efd7cc5a904c6d905025a431

  • C:\Users\Admin\AppData\Local\Temp\Cab28D7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar29A6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2140-6-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2140-0-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2140-1-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2140-2-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2140-3-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2164-5-0x0000000000210000-0x0000000000323000-memory.dmp

    Filesize

    1.1MB