Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe
-
Size
271KB
-
MD5
d3907500390c4e5734ab435bf4a33c85
-
SHA1
036cecf62a8d8d1bcf90a7bf0e6637d75911af52
-
SHA256
0cbe4fee45fea8c8f6adf083c9b44293161083716f5cb930d56315f9e951e699
-
SHA512
143e0bc2462b5c8969d664ced109f150a7cfbb4887dada658568163f0410663f1f0069338e7037ca7b819b9e7f03d3cde83a0ffb8447af096a98b711f2859596
-
SSDEEP
6144:100U4fknWYEz59elkuHiEnGj8m5LEWq/bwLCtC07cWpLDeeU8HTV1lVFxnUTZo:BU4fA9m/eIj8jW7uYWpLSeUkRV72o
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/528-2-0x0000000000400000-0x0000000000547000-memory.dmp modiloader_stage2 behavioral1/memory/528-6-0x0000000000400000-0x0000000000547000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\FieleWay.txt d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 528 set thread context of 1300 528 d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA5576D1-6D9C-11EF-A641-5E10E05FA61A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431932486" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1300 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1300 IEXPLORE.EXE 1300 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 528 wrote to memory of 1300 528 d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe 30 PID 528 wrote to memory of 1300 528 d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe 30 PID 528 wrote to memory of 1300 528 d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe 30 PID 528 wrote to memory of 1300 528 d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe 30 PID 528 wrote to memory of 1300 528 d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe 30 PID 1300 wrote to memory of 2852 1300 IEXPLORE.EXE 31 PID 1300 wrote to memory of 2852 1300 IEXPLORE.EXE 31 PID 1300 wrote to memory of 2852 1300 IEXPLORE.EXE 31 PID 1300 wrote to memory of 2852 1300 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3907500390c4e5734ab435bf4a33c85_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:528 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4c7f3136772a83e4f41ded0100a0ad
SHA10d24f3f772c2d676f4b0d22dbb5aca95eca0e8e9
SHA256b8236110b19c6661be19382dbf81bfe4d815c66f92d65512600674c1b7afb63a
SHA512e59dce25dd608bbb446968017679a45a60fc7414892660ed66f1ffc35de5f3080b654452962cae3b9ef78701771575b10544153c61ceda01ff49cbd0485b8e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f1c035aeb853820a52acd77bd50646
SHA12a704a1f8e41012090461da6663b1bd26985cf4c
SHA25605f4abd29edaa45ab7c5e024f5ba86b5aec1844de91aa9ac917e3075c80ec1f4
SHA512cdb17f98caae362bf6e7387e55bcddec2a04c9ef48192c197d31026e7a322a23a8c6615ddf094f213e8ddab9fbbeb2ff040afbb530eb7dd458b59e561f848e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6dc5aa9a84c45edb342dbd28a7b3dff
SHA14882ac0bfe5ef829cd16374bb301a20e46b45f70
SHA256ce7bb2eb092948a07927bee41403f81b0d485b89b2bde6ddb46408a9621cf432
SHA51277739e8402a6b0b4fb38270262b2215d34a911763017bc90adfc20976bbbd937e08209cac8bca943c2ee170926073da42424b2a9d02ba7fec64bb585f9efe37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b524e2916184a63c38308a328f40f9e
SHA1cb5bd187374a5c520bf510ab1de49d0fd020d7d4
SHA256f3d3a63016bbd6d39a45b9b6a493084deea23e52eff291a8a2a803c219f4ab84
SHA512bf3d3380af8935583dfbc0fda31138e102fbee793c59c22474a2e39786d31713a06851e63a39307db33e279d802ddb78959b35bfda408a5b955f99cd33dfb825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a518a612bef07a1e84be897af46ae23
SHA175aeca316c8a4792e68c8234e3944b938583570f
SHA2564735fc9f26c8c986d677b79cb01775c0613d264c40f0e0fd3fad98a99bd8676b
SHA512123247edabc37a84fb084d8b95e7a514287901ce3652229b8b237aa3b614e7daf83eb44ce92ac8e3c58e89f5fd6a967bcbb0f217ee37a4ad4e789f2c0e0de9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e1c51ffdfb272b473efe299c87d1a0
SHA1b8471bb1a45cc4acc16c442419376462b7e3ec71
SHA2560114763cc2e43c086859218d11fcf13a72ae96e140f9578a501b77aecd63615d
SHA5129b9fda9c3072f498527922f01c944a0f50e64d041a4f1704db3376b9ba03bd95554bab31abefa914bf3a3297540d227b5d1cb3d818492f9f28283e953f85d6ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5897171c8e3fbe7b8bc2a448d1da04c83
SHA111547b2dcffc26216ba32abe70687f17d65df923
SHA2561fd16f97eb75f2a38d2c4342102dd993ad1a0943273f30e391bb1408c17f8c1f
SHA51287bcd6f41daa75a577c2cd26f7431ae5a9a40488190022e55e7187899c0a1d1f3ec94c08841131a6859a66b8c98cae2ce0ed3564729c0f5f26f2b1f5ea464082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518eb82c8f1cbce48361c3419d901e807
SHA17f39f2dadb3a1c82d0db4894e35e0ebc99aabf05
SHA2569a63e2c1e7999275da6eeca00081ff8190c8cf24ff8cb7b30cb0bc34edd33d53
SHA512bd58f662a99db2b3c419d107c48d6069f0b9148b420a930ca9b9a2502a60d93c91437720650ff87521dc520e9d9e18285306fcc47fed866f0b345d1be68f4708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771438b5d266c701350b8752fc049837
SHA112b4f68c3c65e01f69b783a7f018c5321f076c11
SHA2569a0fcc92531d3dda6ec42b8a194665868ffe45771c682ed08fa3d17657471a72
SHA512dd11a009bc5ecd79f9f678a4e956e2ce03ce08bfe0b78827d24d8ebef1e535a28350021e4108d287d77a303c54c95dbb33e24c68671bd172484765d7aedbda3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe538850bcb67ffc731ad420b512b44
SHA1d7547fa41b0fef5f1b9f537b3a5363308c308913
SHA256e605b2d5b317f403ade8b1874ee9cc7d6487425085ff52c4fc7dff07dd8df79e
SHA5121b83b385169dc208346935d112ad69d20f8121a5e5209950909a7cea27b960afd1b99b68ee3448146fa1c08f6fdb35a9c270ccf95cb16485bd46420d5479fe22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398c9f97b425ca39188f03a4ae5c8d9a
SHA1ff06165b81496f18353879e33552ca33762b318f
SHA2562a93d3685a1d858e03becf1d1da490ba1dafe7f79e75108d509fad4cce14524b
SHA5122ac52a3530bc763eb5ccc6a6f4b422322d366c8c3b85fd5b987cfc827aa53e49a9c1e662a7892781d75b774fa0b0f5769fe45413463044ac4f86ff734eaa84f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4816398dd8daf7c30340a530957a2b
SHA1efba02f8367409e46107ac47381a95e4ea3c4879
SHA256218f36c58e66c18f9058e80a4c2585120ba187bd8344277ea5f6ea866571ef13
SHA512b534efc938233bb8928e8a33c34f65d4ec8454811843a4e8636f78f2b99458ef0bad60fef3cdb70f0f3de085ae00a8a16605505fbae5fec8943e6910456711f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e8275830ddd6161f64ba84fdb28c4d
SHA176d392bcfcfe1b73cb2a3c1bf610b69f388fa15e
SHA256465f935bc2c0047aa3a31eadc26348906d14f468a9d16995a09fa908674b7876
SHA51294ffd033c087b1e2ca7bec8b9306e8f7efdc817a1a59e8e7728308bc3df80af80642b5d44cffb8cce8920fce87c7a60d66234be1e5ee28fed122e465955283fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71cc9beb02ed9bf30c1b76238e2e9e1
SHA146f7a50b90d37bac927ded39a295874a038674cf
SHA256fd8f9809c66843e4d1cb46b2641e9a586ff94eeda5bdf6619d108736323bed31
SHA5122db35c2197b56e8c7c7140bfd519b3049db80710df88a2d643c137f54dfec1ad85d5417236f54923ecaa0be4e30d4b4c218bb3232e747f63450485656b0ef979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7fa2ec908beb06c5d429dff1f15d325
SHA1a168460809b1a003a2501f3e5a6649f7124828aa
SHA256886650b33e2010a596018e7edf2b89e122bc4c4536fc093d8d73462267995236
SHA512211582819b5430eee2317a0a7acb122d04e974267ad740a423cbd64334d5fce48b02604030c286401ae7cc21d6c6df7003d315f3642df7e7c178bc778a53c43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81d72e507cfb19da90fe08c2a54fe1b
SHA1bcb9e84ca9c7f8e2c206e794ba56d2c211a1e7a7
SHA25608c9096bf9f35b7f19806e24fec4f320e636d89f86163f12a20a89f421e746af
SHA5129a1c656686f759f3888fb868fce1453450e12e051b4768a8d178bf98f9b1889736c7e0200be307f3a02e5dde1432a2582b77612768dd375a131c96d3dae1341b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0a34003caf8df4387daa12cf5cdece
SHA15b126b88903c014b2e8d22ce2f206ba3b0cb902f
SHA2567c513adc550c5f90169511a78b0dc230f3ef79ecbb82becd5182ff077413754f
SHA512e5f54eaec15a70f59216056f028c32a55db27d8890ed1c3d520e7122753e35208e6baba2e483dd733474ba5a6786f35e7fe5c0492645dadb767fdb2d8a6050fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3995cba6c109f9dc5801edde1dd16d
SHA1ed0bf70a093e581d1f53d7824d7ea7dd84f476a1
SHA2567e42ea87d670b11c0681886450855aa409bb1fda04806191c475629a42e5e704
SHA512d7697e7ce8b10191d1c511b5f01db5d2881b76a5702044e8d7a478292585ef247e01edef71be3fb563c4d9e5544cea9dc23960d9ab457dc100e6dbd2b8c4b656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bec820235564d930495e45ca966fa94
SHA16d8428ffadef1b7bc2fef0ab79abfae9426483db
SHA256903310ddbbacb682dafbc32a311067627e768b3ea92d741d05a9b27c5d8f88e1
SHA51205c393e755978fd9dcbf0140003684ada6de09400bbba67da7478ed46f1384d5aee17a4a7a6daabc8d06bea7549331e8ecec20987eecd6fc20b24f4e8169711e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b