Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 04:43

General

  • Target

    d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe

  • Size

    271KB

  • MD5

    d3907500390c4e5734ab435bf4a33c85

  • SHA1

    036cecf62a8d8d1bcf90a7bf0e6637d75911af52

  • SHA256

    0cbe4fee45fea8c8f6adf083c9b44293161083716f5cb930d56315f9e951e699

  • SHA512

    143e0bc2462b5c8969d664ced109f150a7cfbb4887dada658568163f0410663f1f0069338e7037ca7b819b9e7f03d3cde83a0ffb8447af096a98b711f2859596

  • SSDEEP

    6144:100U4fknWYEz59elkuHiEnGj8m5LEWq/bwLCtC07cWpLDeeU8HTV1lVFxnUTZo:BU4fA9m/eIj8jW7uYWpLSeUkRV72o

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d4c7f3136772a83e4f41ded0100a0ad

    SHA1

    0d24f3f772c2d676f4b0d22dbb5aca95eca0e8e9

    SHA256

    b8236110b19c6661be19382dbf81bfe4d815c66f92d65512600674c1b7afb63a

    SHA512

    e59dce25dd608bbb446968017679a45a60fc7414892660ed66f1ffc35de5f3080b654452962cae3b9ef78701771575b10544153c61ceda01ff49cbd0485b8e7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0f1c035aeb853820a52acd77bd50646

    SHA1

    2a704a1f8e41012090461da6663b1bd26985cf4c

    SHA256

    05f4abd29edaa45ab7c5e024f5ba86b5aec1844de91aa9ac917e3075c80ec1f4

    SHA512

    cdb17f98caae362bf6e7387e55bcddec2a04c9ef48192c197d31026e7a322a23a8c6615ddf094f213e8ddab9fbbeb2ff040afbb530eb7dd458b59e561f848e57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6dc5aa9a84c45edb342dbd28a7b3dff

    SHA1

    4882ac0bfe5ef829cd16374bb301a20e46b45f70

    SHA256

    ce7bb2eb092948a07927bee41403f81b0d485b89b2bde6ddb46408a9621cf432

    SHA512

    77739e8402a6b0b4fb38270262b2215d34a911763017bc90adfc20976bbbd937e08209cac8bca943c2ee170926073da42424b2a9d02ba7fec64bb585f9efe37d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b524e2916184a63c38308a328f40f9e

    SHA1

    cb5bd187374a5c520bf510ab1de49d0fd020d7d4

    SHA256

    f3d3a63016bbd6d39a45b9b6a493084deea23e52eff291a8a2a803c219f4ab84

    SHA512

    bf3d3380af8935583dfbc0fda31138e102fbee793c59c22474a2e39786d31713a06851e63a39307db33e279d802ddb78959b35bfda408a5b955f99cd33dfb825

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a518a612bef07a1e84be897af46ae23

    SHA1

    75aeca316c8a4792e68c8234e3944b938583570f

    SHA256

    4735fc9f26c8c986d677b79cb01775c0613d264c40f0e0fd3fad98a99bd8676b

    SHA512

    123247edabc37a84fb084d8b95e7a514287901ce3652229b8b237aa3b614e7daf83eb44ce92ac8e3c58e89f5fd6a967bcbb0f217ee37a4ad4e789f2c0e0de9a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97e1c51ffdfb272b473efe299c87d1a0

    SHA1

    b8471bb1a45cc4acc16c442419376462b7e3ec71

    SHA256

    0114763cc2e43c086859218d11fcf13a72ae96e140f9578a501b77aecd63615d

    SHA512

    9b9fda9c3072f498527922f01c944a0f50e64d041a4f1704db3376b9ba03bd95554bab31abefa914bf3a3297540d227b5d1cb3d818492f9f28283e953f85d6ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    897171c8e3fbe7b8bc2a448d1da04c83

    SHA1

    11547b2dcffc26216ba32abe70687f17d65df923

    SHA256

    1fd16f97eb75f2a38d2c4342102dd993ad1a0943273f30e391bb1408c17f8c1f

    SHA512

    87bcd6f41daa75a577c2cd26f7431ae5a9a40488190022e55e7187899c0a1d1f3ec94c08841131a6859a66b8c98cae2ce0ed3564729c0f5f26f2b1f5ea464082

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18eb82c8f1cbce48361c3419d901e807

    SHA1

    7f39f2dadb3a1c82d0db4894e35e0ebc99aabf05

    SHA256

    9a63e2c1e7999275da6eeca00081ff8190c8cf24ff8cb7b30cb0bc34edd33d53

    SHA512

    bd58f662a99db2b3c419d107c48d6069f0b9148b420a930ca9b9a2502a60d93c91437720650ff87521dc520e9d9e18285306fcc47fed866f0b345d1be68f4708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    771438b5d266c701350b8752fc049837

    SHA1

    12b4f68c3c65e01f69b783a7f018c5321f076c11

    SHA256

    9a0fcc92531d3dda6ec42b8a194665868ffe45771c682ed08fa3d17657471a72

    SHA512

    dd11a009bc5ecd79f9f678a4e956e2ce03ce08bfe0b78827d24d8ebef1e535a28350021e4108d287d77a303c54c95dbb33e24c68671bd172484765d7aedbda3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fe538850bcb67ffc731ad420b512b44

    SHA1

    d7547fa41b0fef5f1b9f537b3a5363308c308913

    SHA256

    e605b2d5b317f403ade8b1874ee9cc7d6487425085ff52c4fc7dff07dd8df79e

    SHA512

    1b83b385169dc208346935d112ad69d20f8121a5e5209950909a7cea27b960afd1b99b68ee3448146fa1c08f6fdb35a9c270ccf95cb16485bd46420d5479fe22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    398c9f97b425ca39188f03a4ae5c8d9a

    SHA1

    ff06165b81496f18353879e33552ca33762b318f

    SHA256

    2a93d3685a1d858e03becf1d1da490ba1dafe7f79e75108d509fad4cce14524b

    SHA512

    2ac52a3530bc763eb5ccc6a6f4b422322d366c8c3b85fd5b987cfc827aa53e49a9c1e662a7892781d75b774fa0b0f5769fe45413463044ac4f86ff734eaa84f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba4816398dd8daf7c30340a530957a2b

    SHA1

    efba02f8367409e46107ac47381a95e4ea3c4879

    SHA256

    218f36c58e66c18f9058e80a4c2585120ba187bd8344277ea5f6ea866571ef13

    SHA512

    b534efc938233bb8928e8a33c34f65d4ec8454811843a4e8636f78f2b99458ef0bad60fef3cdb70f0f3de085ae00a8a16605505fbae5fec8943e6910456711f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0e8275830ddd6161f64ba84fdb28c4d

    SHA1

    76d392bcfcfe1b73cb2a3c1bf610b69f388fa15e

    SHA256

    465f935bc2c0047aa3a31eadc26348906d14f468a9d16995a09fa908674b7876

    SHA512

    94ffd033c087b1e2ca7bec8b9306e8f7efdc817a1a59e8e7728308bc3df80af80642b5d44cffb8cce8920fce87c7a60d66234be1e5ee28fed122e465955283fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a71cc9beb02ed9bf30c1b76238e2e9e1

    SHA1

    46f7a50b90d37bac927ded39a295874a038674cf

    SHA256

    fd8f9809c66843e4d1cb46b2641e9a586ff94eeda5bdf6619d108736323bed31

    SHA512

    2db35c2197b56e8c7c7140bfd519b3049db80710df88a2d643c137f54dfec1ad85d5417236f54923ecaa0be4e30d4b4c218bb3232e747f63450485656b0ef979

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7fa2ec908beb06c5d429dff1f15d325

    SHA1

    a168460809b1a003a2501f3e5a6649f7124828aa

    SHA256

    886650b33e2010a596018e7edf2b89e122bc4c4536fc093d8d73462267995236

    SHA512

    211582819b5430eee2317a0a7acb122d04e974267ad740a423cbd64334d5fce48b02604030c286401ae7cc21d6c6df7003d315f3642df7e7c178bc778a53c43c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e81d72e507cfb19da90fe08c2a54fe1b

    SHA1

    bcb9e84ca9c7f8e2c206e794ba56d2c211a1e7a7

    SHA256

    08c9096bf9f35b7f19806e24fec4f320e636d89f86163f12a20a89f421e746af

    SHA512

    9a1c656686f759f3888fb868fce1453450e12e051b4768a8d178bf98f9b1889736c7e0200be307f3a02e5dde1432a2582b77612768dd375a131c96d3dae1341b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df0a34003caf8df4387daa12cf5cdece

    SHA1

    5b126b88903c014b2e8d22ce2f206ba3b0cb902f

    SHA256

    7c513adc550c5f90169511a78b0dc230f3ef79ecbb82becd5182ff077413754f

    SHA512

    e5f54eaec15a70f59216056f028c32a55db27d8890ed1c3d520e7122753e35208e6baba2e483dd733474ba5a6786f35e7fe5c0492645dadb767fdb2d8a6050fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f3995cba6c109f9dc5801edde1dd16d

    SHA1

    ed0bf70a093e581d1f53d7824d7ea7dd84f476a1

    SHA256

    7e42ea87d670b11c0681886450855aa409bb1fda04806191c475629a42e5e704

    SHA512

    d7697e7ce8b10191d1c511b5f01db5d2881b76a5702044e8d7a478292585ef247e01edef71be3fb563c4d9e5544cea9dc23960d9ab457dc100e6dbd2b8c4b656

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bec820235564d930495e45ca966fa94

    SHA1

    6d8428ffadef1b7bc2fef0ab79abfae9426483db

    SHA256

    903310ddbbacb682dafbc32a311067627e768b3ea92d741d05a9b27c5d8f88e1

    SHA512

    05c393e755978fd9dcbf0140003684ada6de09400bbba67da7478ed46f1384d5aee17a4a7a6daabc8d06bea7549331e8ecec20987eecd6fc20b24f4e8169711e

  • C:\Users\Admin\AppData\Local\Temp\Cab9D4B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA0B8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/528-0-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/528-1-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/528-2-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/528-4-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/528-6-0x0000000000400000-0x0000000000547000-memory.dmp

    Filesize

    1.3MB

  • memory/1300-5-0x00000000001D0000-0x0000000000317000-memory.dmp

    Filesize

    1.3MB