Analysis

  • max time kernel
    70s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 08:27

General

  • Target

    d18005e41d7b0691f49b12a85de0c4eb_JaffaCakes118.exe

  • Size

    629KB

  • MD5

    d18005e41d7b0691f49b12a85de0c4eb

  • SHA1

    7841bf306b1d30a7d93c4f4ad53b627b2d881cad

  • SHA256

    ed4bff8ac7ea85203e9d1a72e44a42b8b6c7194b06777cd170c7f190482aa893

  • SHA512

    1a577872d9a8a17e854c32ea234ea2116029884634ee5bea23984132d2d7b7b018076a97da1961c5580cedcbbe5f2798156cae9136b212aa3fd9b575b8d9df18

  • SSDEEP

    12288:mr05XmypbFWG2rV+4pRViG47BKe8criDeewYahleFFWQKJ1U4INFdj:A05mypZ5gpWNKeiDuYagFWQKJ+NFdj

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d18005e41d7b0691f49b12a85de0c4eb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d18005e41d7b0691f49b12a85de0c4eb_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1be3bfcc0b115c0b31bb4609c7b84737

    SHA1

    7d04290332c0e0a0c6f65030262e05473e9a861f

    SHA256

    260b6e713ec21021f2e9790d82cf983efe57b6aa4fc4bc7089090d17817c0328

    SHA512

    9c2256b87e2ca19aa9b771a1b3a39ed1c2994dca3fc2459590e9de9b9e6f9259338e49eae560aa31e4e5b8c54207476fee5ce6fd8881e4aa232f7c28d4ee5356

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1765a59cd549b2528aae2e3025f649a

    SHA1

    c7df9e655456e4f35dd8d2b375f337fcac6fd0b0

    SHA256

    83e4182413518baaece3dd18ad03d084eee653ae4458d87777fa331e9cfdac95

    SHA512

    e56326fa4997fc69501afe3a3b4c759f8c3c4cd3d7068fdbb260b5d38be5e97427f8b76e4c890e12070062b1c497fd08470cdb958650733282c6e5c050c229a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85c2001a7018326333f6b719ea4148cf

    SHA1

    53f08286e54d73c55abf2a0062cfea97ca423856

    SHA256

    5fb74ebb1c0b5518bbcb532423a6652437a5692998ba34140d1345df6e7050f0

    SHA512

    f52f6c38fc044a4803b00c81e031df02ba1448b894192aa10c84d4c6bd7a5ccca48052f0452952cd571eac1be3091bf084ce3dd24299fe7a02b90746e3bc0587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53c29af47bdf9b5ebc3edfd2fc1e80f0

    SHA1

    44d0b49585fd526be108f3a9722b8f8f894e57ca

    SHA256

    d35b3ee6e5582d1ac0b1f91049a4f12487196b6438a7342d7b5dd58eb5315753

    SHA512

    36ece3f8a374a6581bf5b7e412c373dbe7b23830e33a2c406bfbf907ac725a4f2b8587d7fb5b74fddd1c72a1c6a684bcc6f4749709f36b268675cd4be8423414

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d57db80805648bc0ee0f763b080b39b8

    SHA1

    9d16b2d73df7440aaadec3f5f295c908c7009477

    SHA256

    fea37363d3e8a9b0ef0746e1c8af6a0cd5b5fa48405a66bed77b48b1b7fd63c2

    SHA512

    6cd8d552b8bbba042dae65675dd6538b4b909a0d3bc623ab0809ada8d1323d7f10f72f609ca76ad137ddf8c93a4e412da447a5fb7910e10e59ea7efd87e350ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fda39f2a817db0543f24a27f32dda0a

    SHA1

    2bbda51c409d7a7c802c4e79912bc5a08ba0dfce

    SHA256

    019924505ddba02da752fd11c3c3c2cbcfad98e7abb952c1cf775ee84a46513b

    SHA512

    b687d14331a748e33ea66de70dd52a499c46930e1ba87038ab72c441c3185660e1688bb8135ebb667bfd1013f32286c9d7009644a413baaa805d9f4b7420824c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92ba0fd040097e7842979f1195b645b2

    SHA1

    c51ec73938fa58bdce43d10050768d2735b095a2

    SHA256

    f44835049dfb3f67349766873bc460132ced6dd59e00eb3a33344a9e869b1a1e

    SHA512

    670d44d2dec7d0c33ec258e4fc01cfe302c85b876c6a7f22bea2e24b56854031032fa222458207c2b9c57db13c5eca5a47a912a463729b2994558d2f014c7e7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c39dd01e4ae4f240b8c3318e0628f8a

    SHA1

    ed36d36d3282cce3df4fd644705a8c5bcbe18fd1

    SHA256

    2e5c10ab0df0e3dfffa8e739a81ff386c3bed93990a9c0437129dc9e1d2af8ed

    SHA512

    e73940ca01314bfa97f3f9db1da9562e87d734ac0b7ede4773f3f2b84bdae523f6f9696d10a7425e87e7f8321ab1f50b7b834b8a7670eb16ac8555671fe1e357

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    470793342c9b0cb3665cf4060eaeae93

    SHA1

    38d717cd2e7ad7a6aa95b7849e08458017c3c8f7

    SHA256

    4d36e8257d7f7bbe7ef541165787ec55d78a47d9a32d70012432b8aefe983920

    SHA512

    dd4c651099fd748dc0d185134ff617ad38811a4ed2c34a309d9f6b4a8403fabc5aa24ab3b263bc220ead5445103b8bdf0a789e9bf32ebeea0a606cce42f2dd41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7184bfb802459e4aa4e7caf2d018ee7a

    SHA1

    4d828072d8af31bbc03327e2335ffc02c92d62c3

    SHA256

    2de14b83f7d325d086dd5b0aad2475b2723a2a151e46692f3efe939a93c166cb

    SHA512

    7d7a281c8e688a99601c13b7312dfc5996d812ba215f5aef112b57cbb5d3a9c8b35734b105c0445f4bcab78a0cbac6b94c6a25aae83957d7435f85a3d46d73f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12482331b844801d1cbbce04518a94b2

    SHA1

    2a75abf75a319316a84e0dfe8f72ef01281e2631

    SHA256

    8bf5663d45bc4ee08574533bc9deb1ba9b7e59e5ba6f39658d732b2011c9d8c3

    SHA512

    119ef1cc272a9d80b07d02ae6251c75a309c29f0bd402d45dc1a08fdab6831458acccab34a3b7361470083ecca5b0479e5a655cac2f0dc577ccd117a29245d8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a50ec6082d478677b7016f828175bac

    SHA1

    8f5c2aa6d5448301d7eddbd5c8f508d1b303b58f

    SHA256

    e00566d939e85f182e4ff8181ba7515a5fe5e0669224987753db0994263da66c

    SHA512

    b461f78eb635e5c7a717533dcc23ef13166d1a532acf0f07d1c8182dbe815364ac5f4794564018731cc5b5e959877c4e4c2f1ab36dd9d7d1247919b31322403d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c399ca5cf89fbe094abd405ee6dac61

    SHA1

    30debcb2cc26f57d98573cdcb0ba446947c48ad5

    SHA256

    a172c408eaeef39924125f1c1fc1a11cbd2decfb0a3995153f29d1558e9d0917

    SHA512

    7dc13506e2f7b497a1e1c576d1ae52e5b0c408a684a980596af33839321dbd341d14d33dd1c4cf88a8921ff14955f666f1e76264464da2ddffe970d75f2f6f3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf5d9f6ea9d8e1097b635bfa77a7e8d1

    SHA1

    42e17d17adb24f5c8cd89be74ef5d9ea47bc839d

    SHA256

    1eaa092c44f8556d6717d6cb582c21d7e6398166d1b05dc302b0ff28bb3063ed

    SHA512

    d2fe9cecb648d2953c91ef2be341667922c5ab82180cd01f66a60575fe2e6185ea9af6d16d423dc1686224c5bac3dd8c3a1af6ed701987588b368c9a26a5f5e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a027b48fc38bf9c4c97e9b3c01a7688d

    SHA1

    4e5e6eebea256cb064567b7984b45d7fa9bdd9c5

    SHA256

    2baa1d2680323d64c5dd37c334061b0f5838dab9e764df9615b5c10f1e784c2e

    SHA512

    593a497a9d0b03c616d4d00d6f61e431f0326d641f35a93b07c9a92a6eb20153135a8348f3339fa77b79c313d46e2ccf2e85ae95a6fe7dd005b94d2d0af35e7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a9588a9b109ac3fa329941b386ae40e

    SHA1

    25ea6f435fefa0663cc188f5d3dda4f54767fe14

    SHA256

    577d9ec33809b9787bf986d445dc9db1fc768a6dcee1418763f8f6226bc5b5dc

    SHA512

    25d9f99b53a2720a13817d992b383f780ad75b0db46998fa008599a03ed132053b76e2d440307b4646d4417bd2be99b8dcc3335210e4994fadda3a402e284eb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    997f66d4a05862ba622246d837cf4543

    SHA1

    2e1f9c303e43d32efcfb067f4e661143a26b5344

    SHA256

    730ea287269d9296fdb65bcbee3db9ceca64787ef5bd308b3e51d1bdc187e172

    SHA512

    d03ddbb9c7ca5c22bfe2020f03e9efbcc6931d707f7627571407f1af4590dfa58954593d2868357bfb8d394bbdf08913bd7a3f1120a26e4637cb406819c48647

  • C:\Users\Admin\AppData\Local\Temp\CabE572.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE650.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1872-17-0x00000000034F0000-0x00000000034F1000-memory.dmp

    Filesize

    4KB

  • memory/1872-10-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/1872-13-0x0000000003400000-0x0000000003401000-memory.dmp

    Filesize

    4KB

  • memory/1872-12-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB

  • memory/1872-0-0x0000000000400000-0x00000000005AF000-memory.dmp

    Filesize

    1.7MB

  • memory/1872-3-0x0000000000670000-0x0000000000671000-memory.dmp

    Filesize

    4KB

  • memory/1872-4-0x0000000000650000-0x0000000000651000-memory.dmp

    Filesize

    4KB

  • memory/1872-5-0x00000000008A0000-0x00000000008A1000-memory.dmp

    Filesize

    4KB

  • memory/1872-6-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/1872-8-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB

  • memory/1872-9-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/1872-14-0x00000000033F0000-0x00000000033F3000-memory.dmp

    Filesize

    12KB

  • memory/1872-16-0x00000000034F0000-0x00000000035F0000-memory.dmp

    Filesize

    1024KB

  • memory/1872-1-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1872-18-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1872-19-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1872-20-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1872-22-0x0000000000400000-0x00000000005AF000-memory.dmp

    Filesize

    1.7MB

  • memory/1872-23-0x0000000000320000-0x0000000000374000-memory.dmp

    Filesize

    336KB

  • memory/1872-21-0x0000000003410000-0x0000000003411000-memory.dmp

    Filesize

    4KB

  • memory/1872-11-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/1872-2-0x0000000000320000-0x0000000000374000-memory.dmp

    Filesize

    336KB

  • memory/2420-15-0x0000000000250000-0x00000000003FF000-memory.dmp

    Filesize

    1.7MB