Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 12:17

General

  • Target

    e276f767ed5156af232c6f82bcac5df0_JaffaCakes118.exe

  • Size

    469KB

  • MD5

    e276f767ed5156af232c6f82bcac5df0

  • SHA1

    58f7dd48b3f481c5ef39ee5ef5cefb5246c41c32

  • SHA256

    19fc4a0d1dd6520fe79582c7ca4383c7a91e68731ad2cf1a606fe1f16c490a70

  • SHA512

    23b1dc0eb7829d5b341001377d40da1f4285d521329976498d3e99db7c95aed2622f00a3133bd096477180f3316723be114040592fc346de591280f7507583d2

  • SSDEEP

    12288:vN3o7Qhke14kOKTJxyProSMDFW4KftL9IB:vNHhqkOKTyPYs4yhIB

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 5 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e276f767ed5156af232c6f82bcac5df0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e276f767ed5156af232c6f82bcac5df0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\10.exe
        "C:\Windows\system32\10.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\9.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe
            "C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1576
            • C:\Windows\SysWOW64\calc.exe
              "C:\Windows\system32\calc.exe"
              6⤵
                PID:2604
              • C:\program files\internet explorer\IEXPLORE.EXE
                "C:\program files\internet explorer\IEXPLORE.EXE"
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2668
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1804
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\SgotoDel.bat""
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\SgotoDel.bat

      Filesize

      144B

      MD5

      7a5c4dba29c879ddc3b8e421d4b39361

      SHA1

      613563ccc01da90520fc0384559d4eb1f2a711cd

      SHA256

      d06f78d4a720d31ea1fa7eaaa3492c22c35e495ec473c5c741bdeecd7472ae1d

      SHA512

      401baf8e95cce9ca6a6088771e5ff8a6be19418642a6a40aebdc6996ca69d89c9f5a07978091e3438f629d78bf1f2a609c1b22009c9ad9ddc1dffcdbda6cbd16

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      57da2339a2f38853567dc411d8311add

      SHA1

      4086521757fd4d8e59bbbc65bfcf9e1909829414

      SHA256

      13154f0f0666fd3047145fa6379eae33c85d376d3c47a3a184b885403de2be86

      SHA512

      a289b97c58b5e368b59dfd6cfa8655f5eab56e9d8be775afbcab73e6058e1945e46b0bebea5341a934a6be2f8e49828e61385351adbdd109b7597ab322040aa3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d38b14e074b8d9f6ff971f02c71170d9

      SHA1

      97e9707bf0a8fe546ae4b47acfaad29c8aa77912

      SHA256

      8435b84e43b626544ab605323c16e715f132cc46fe0722446e7809330363d46a

      SHA512

      fa4c4855cc07775a9c86b9679cce90e68d55f5a337748e2e93ba06c861e1de52cbd3c8f7228c5b19dcb06fdbb3694c08276067787a4638c7c1aeb5abe69de1ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9823b063728e3357d1a9f8a11340ddff

      SHA1

      28c7c884fd9b39dd677dd6f0accab407c458aca5

      SHA256

      7c4608d2f9499e9362521acb9dd2e1842eef304d50b620a742203fa2fed73035

      SHA512

      6589b8c8036b45d8b987544da21e5043d44344b195356b362c3638fd81b8cb92d957325bd83cce782b140af4a5eb91cee4c802e6041baed913c02ce577f67d5f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dbc93596530de2b81b2d4b28d5e8966b

      SHA1

      525b1b5c454a5a5cdb36e7aca8e6fd2a9a3f95bf

      SHA256

      28786451f55bb21d06f3835bb078b66ccc372bb17588e561351f8499b19d2b13

      SHA512

      9ce86e0daacb60ce5bd6ce8ea682bb678dc8cb4ddf44c4cbda7c59afde99977e5b2aa57e74b3edc72e38b9f14adcd46c3f0057f0d2c0856ebffdce8a93f40bf3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2cf9c28fa5401069287add00f77ea4ec

      SHA1

      a7af0cdcb826eaf6d3d11639e8e57916528dcf5b

      SHA256

      3a2ac93f991ff61dfe41e7642ec82d9b7f444e73a355c6827671d07dbb677ae2

      SHA512

      47cea543accfaed9c06c9d9e03585b0a31b4c1dc12a8866729dec65c83c9dfa60cdc1749a4cf54dec35fffdf69973d0d4a2b8481dc74074f094fb5f65b2c2ebd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3dc4251e1ff18f90769d0f2d4a983449

      SHA1

      ef16aae604e01545571036470ad86f8781160699

      SHA256

      d5cc660a1024b8e34546465ce44502ce36356e2078e1f89924aea9b3e02d9008

      SHA512

      67edd2dc2597b45a4649716fb5fc8d7c3d59cfde040d6b386b34c644afb47f3629a998f2439d81af8bdc5a18de0097bb6dc4983a33522973ec279ac134b86049

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cecdef53f99ee4bbd42610cbb078ad4c

      SHA1

      5944321f08ea151448558bd06ba1bb99f3bcca36

      SHA256

      f1b82e928b1f5e3fb970e2b06eec146e4a79c0602f78ac74195a62006cf886a7

      SHA512

      487c9428be71ff7663b73da80ffba110dd42e780145951a325407904dede9f29adc97b3bc53faffe3949fb7e08603cca3e6b608258bd1d39cd378cc03dbd262b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      72615f2ea0a787cdc85b773a96224d93

      SHA1

      58dbbab549747981ae6b4383f29eb1c2df4974d2

      SHA256

      12684a39625987e87019a715e1885a413cb821f65603047b9eb5fb4f81c8444a

      SHA512

      30eac2d29c7f569fe69e7d6613cba74a382ea9dd40f5a2786a9d714a2ebbe006770f9a3d51bbe0e3b6938b71313bc2ab4ca56cdc5c21fbacb8756a5ecca9e607

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1d109be0a974b67dc450569339f28ac1

      SHA1

      339a0944c5597263a981cd2033897463a02b6b41

      SHA256

      d448ca74f7bf8dd27168c835308668a8bca7fcce6c24e3ea17c913882dd9a079

      SHA512

      3e51d6cd32d89085f1f1cab171732067f2855f309ecf54686efa66b0cab311b4c091b9073271c1c5e52b348993bd791641d025186412d44a27cb7b2d73837c98

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0b3b2a0953c6db810baa8500066bf94d

      SHA1

      7223caf23d713d22b9fcd373641f76ae9a89d76a

      SHA256

      b5c2142c3c9ac36de7a872114f12fd77139eeb06dc099add116b6a5998fa0019

      SHA512

      b4d8ae24da07ee688c2e2665da45bb9b6be1ac5d73249faf822bc430d89e06fe71cb7f8707c81bcc8239fe30db59e568ddb8d81a91fc140c9173e23641bd879b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      70819346f03d1319a2583a940d2984eb

      SHA1

      d5f8d938c02c5430daadfb473ffd6674c8ccb781

      SHA256

      526971eb3b684351a3272d33bf8cc2a88a6210bf41f8f9a034a359cf45a4b7cc

      SHA512

      d094f492d92aaded19b36cdecd5784044ba052fa5d0dbe29235c39a276c30ede3ed3e1d03fc62c7c2588cc88bfb74da2ec74c9aed2e7e5059ec5055e89eece0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      debeeafd3ec557742d3ed412f4044b05

      SHA1

      8143a0ca594defcc82a4514de94c669c15791bb0

      SHA256

      c465b4b16c68415c190327964ff0a44687d10621dd79639c39fbe531183e9376

      SHA512

      c77b1c06799d8b8244c8395c4bb1a888b00f0a21844e7427b6a332fb1454cd601cdeb1ead14d7b997c5166f5fd11324dfbfab082b675ef5d58be66d11a3c32c2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      82f69ffb0d123a636fee5a9a1c0634d1

      SHA1

      79d997e7921c6d2645d3629ec1ba9f6a4464509c

      SHA256

      687d82edf790fca17e44291a6b3ac78f8c44637255088ff7b8bcf17fbb8f856a

      SHA512

      d3854d268aebe9dbd3dd53b1553762c556dc879b5a3ce267baaceee450e3a36c44e9c4e4cf8cad4cf0a1a611abc55df0364af6c4c29bd9aa0ff35ace93987459

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      332bd9b68aceb260b51fb3a44a5a891a

      SHA1

      696f9c747032acfea322e63b8b2777b37697fbdb

      SHA256

      a4e057b9e85b75ae5201786edb9c4068ecfa6bd211ebaa6ef3468609bc2dd588

      SHA512

      2dcb5051aea2a560477a8d1128efe79ecabc8bc95cc7945b22e8f4d7b489eb449d5d7e5760eea2ed26be5093d7cf6629bd76769683f1e13a822b5217610a1ffa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c02bd19806ed2ebbf1a11bd1ac201c04

      SHA1

      4c012e7dd209c4a81644ba587e009b6d91ed4ccf

      SHA256

      35885926ae3b0cfa824b4233b8ed70cdd233d41c4becee6ad10bfe1d73b928d3

      SHA512

      4648e3fce9a16d743fbce734bbd1c4f19cb4914784c47399f207246983ad211fd300ab78c4fb59d1111c74d9df9dbbe805ec3c75b6d288c8afc294f014956577

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      49abe5450dd5a95abcd839f61ea6962c

      SHA1

      0e2124a3f7d6aefc0cdc3e757b1a0bd6131e416f

      SHA256

      60827ae8cd4d24d68dbf7d8652702822eebfcde6477c335609a011e5f9d424a0

      SHA512

      8008d493ffa3d7f693aab00302f648163d3ae911dfa9bb7e57de3b4e510762795b2bf0e29fe58741c90cf0c726bd2fb34a4926f542c4819a7f0fa2b42ab9c44a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2102f04f52a9ef6397801fe69d8857ee

      SHA1

      db15e14b2fb37ecad399d3f62dd8c8f59b222ade

      SHA256

      69ab2bc5329896bceb68f1eb67d41b79630f9435658a9cef9aa3accb6116dba3

      SHA512

      022a56b4cee4ec57e816a0c16d247f48a4d36392eaca3af1542c995c9d5a512ea48d2bb45bc31b709f4836405b27b6e3e9706b28091714366d22a2979e709e10

    • C:\Users\Admin\AppData\Local\Temp\CabAB9E.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.exe

      Filesize

      441KB

      MD5

      f2daa5a2d5fa10ea473576417babd717

      SHA1

      8b60e361d24851b54223afe9a0fbd8f98d04fa4b

      SHA256

      3b6dccdcd4751f331e90abe564272bd9d733d31db52b027027e5c81c44a7c655

      SHA512

      e174a91f0be23ecbe8419a86806433c8ba2da61579013f8b21647aca60051fd43b4b60e3c632dbd89dc244529e00cec2f245d50038081b9247cf0af9017518ca

    • C:\Users\Admin\AppData\Local\Temp\TarBBB7.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\9.exe

      Filesize

      735KB

      MD5

      f233637598073883ee100a2477e99abc

      SHA1

      2f3c17eccb4d8a961aa720b1ad0eb75769e36cdc

      SHA256

      e8e9d4f16828f407ae93cc6f76c1cd7edd2c19466ec6cef5470f54f57297156e

      SHA512

      048228290f524470570abd2396ce580ae33dc5c413b595c0c69f8fad9c88fa8051d2cf059aae3da7ae32c2f2a74ccadf6b65b581a8befa8502cb889f6960397a

    • \Windows\SysWOW64\10.exe

      Filesize

      371KB

      MD5

      7166b3a3299abc33e6634ea31d8e2014

      SHA1

      a9cf3fa1bc8d7fe40b31219242b8b4635ae152c3

      SHA256

      2a5264c8f205a19b36a7ac2f35968746fee38acecc1da1e34c805f0966b5137e

      SHA512

      27f1f3b3f5e666cd317612bcf75d321cabc3c9f7b66d837fba199846453e79fa7df691ad8f5f7526f556a97452a81915f44249934fc197ded535d89c97219df2

    • memory/1576-52-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2280-19-0x0000000000400000-0x0000000000421000-memory.dmp

      Filesize

      132KB

    • memory/2604-49-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2604-46-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2604-47-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2668-51-0x0000000000070000-0x000000000012F000-memory.dmp

      Filesize

      764KB

    • memory/2788-0-0x0000000001000000-0x00000000010E9000-memory.dmp

      Filesize

      932KB

    • memory/2788-20-0x0000000001000000-0x00000000010E9000-memory.dmp

      Filesize

      932KB

    • memory/2844-60-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB