Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 18:05

General

  • Target

    e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe

  • Size

    733KB

  • MD5

    e31655fd483beedfc4ca77e3273473b4

  • SHA1

    8616ec8cb737c5f56845c63f8002ea92fb353672

  • SHA256

    2acc6bafcbc97e42231fbb8ddf2ee73e284799ad9ad2c9b2da90b07d593a1b29

  • SHA512

    7af05e3a6dd17fafd6bb8aff6d0fbc9b281dd447aba766cccff95efa868dddd360a64e9456c0dc4d0a27c52039732fca93a43f67f1aa99144336b2b86fd76b83

  • SSDEEP

    12288:Nc//////qCHkdPLQ/oV6a1xEUQ4IfV8k9YGhGV3m8VWUY2TD9MAX+hmXhVITCFS:Nc//////JEdDyaDm4dahGV3hko1MAX+z

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb5d1460d7d1f058a8217cd0981b4680

    SHA1

    ff1f60884f5b3eef68b49780370a373cfca7ec8a

    SHA256

    310c35945f50d642b63a19511c6bbc369e71ac9480dc052444290cbf94b64c7c

    SHA512

    f615d0a18b394702702e16fc00e8dc98086f04f93c4426fb8b5439ae670701c35576d1e348dd6cf13e1cb0818eeb9beef61f7f02dc2dfa4a0a32664e49544de5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a70dab0d8333b921cf41f89ab8e37d4

    SHA1

    9182d4162d0e4657b441c8637d56f7d5766f447b

    SHA256

    5a61dd4caf1f991ca7675e50e52e0e5a7b3f1f8ec029e85267ecdc55fd16fb2f

    SHA512

    3d074923f3c22940759f386148b8aa37659e3f3264d8157879b9dd15c8ed9984eb9627f9f25d3fac81a7798f8020fd92a579ccd9267d2c2d09e246c1e3883be2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a552dcad08112fabc7c974e358cd6b8c

    SHA1

    d3f81fd6127dce5aed90a6ac79a3249efc587b22

    SHA256

    c43fa72ad981428e477d38ce48a223d00578ee9d681f20359f71df2c9c948a76

    SHA512

    427e98c8d431aca73db5272be97c5ed70f53e7af972316e40cc3fedbb26f11af0dce7e027e30cf3aa69e4fa4bd6d6810ac88d06757163f4fc41b3fad21117954

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5544e198081e3923ad5eb9dc19d02eaf

    SHA1

    876093ca2b4fab28ff7229c7e420e5ac254edb27

    SHA256

    dfa037f1b06298943cbb1f868b655465a94be15939958b53391a2d6ef474dc27

    SHA512

    72f46350c9460af7884a31537e44a32228fe32c286adce154660ea0be63f1021e914301a42b47e50bf09eefc82cccbe1da2b517f06cbf46d98270d9fa642cb69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    616bb32a9791e835e7629e3dae2044fe

    SHA1

    843ffd6dbb3098f078c655ac2151f72d8de8a4c4

    SHA256

    491b6c328badc8a990c6cf9df9f2c0947f41e2a88e355dc2cf8c31811061b09d

    SHA512

    bcff7583a28be94a4491044a23885924fe6a098f50cdd6f0830c9006f5fab26f463f083f84d8baf11791fe0d54091ed249bed6c985bf345ad7e2de1b31c1ab49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3a3f16e9b48e0db20129dfedf4caa0e

    SHA1

    5026d6c8d204e9e01443a2c2fd3f3b3ecb73ed34

    SHA256

    29ee69d871b90fe2f6f803ed422306a55ba089586cc889ee84cd9e99ac5a077a

    SHA512

    558d5b423214e263ae1da12e8a0cfb2680630c0340e116c02f5ab3af725202675374bf3cc875646faa154fb2d8545f708b606782ff8ebf1b61b76ac0f9d1f4b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6be11d2b113bbe1f5eb6efe9ed6c04c7

    SHA1

    6804e226be742b7c6bbc52fc44cf243d9e54b31b

    SHA256

    7c578eeb14ad9d70bb18608502cc11602e99e0ccafdfdfc32fd5f2d91161cd8d

    SHA512

    c6d97f9c28d939f947ee380eb6bb32825c0b78c0ba750e5757450bbf4e745b3dca10b7b0bcdbf2a45b166892c93d164459b0af10d77e2b547522d631dd9f4fe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6348a3223b8ac0f6beda848bcfbad46a

    SHA1

    26ef5b49b8c65443684fb5bb119d6ff86e2edaa6

    SHA256

    10132c94d120ec241f7e1fb5182f1969594021f19b73185a3809c37ac6ef9595

    SHA512

    efce22347540619055f20aedd30242a5c5c53d85da784f85d2af219ebba1ed71d1ab8000c284a5bb51a3ab9cbf5375b01376d8e281458cab73f237f1167776a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dede706a5b5c069369980631548af2d8

    SHA1

    4eac0c8f3500cf7a7cdcefaad0b99b6d609e230a

    SHA256

    ae6661b9f019a3165ebbfe9f154fe86dac04d794224bf40b4b7de6f331e4e020

    SHA512

    8f025e3eb6caf92b7737b0abbe9bf6b29d3e98547660642bdcc5f5cb3af709d87d44dca3c6a2ba4207e23dca20e905a86c40f5464bf02a4f94b1e915785b5035

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    972d75ebc958295f410bcbc7875b91f3

    SHA1

    83539232b57c09fc8029cac7ec1be870ea10f581

    SHA256

    ad35f235b2430e4a673b29425e4bdbc7a9aa2de957404de7a7aaf94545a5e9e5

    SHA512

    1a9226a4a17103b6c8ada28ac767b9dc6cb268915468eae41e657efd77da963b0e706506912e362ee2120fa07fb36ccc056ba205ab3e0c0ea8afc5c9cdb29a94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e28c81039c4612c00166a3f35175b10

    SHA1

    1d14f2a15af935b89aa4d12906701b3536a3d00d

    SHA256

    d27a46a52303919f6ac344a44e240bcc3c8ab0820b9f2433354053be51361e69

    SHA512

    a86c5567ecc9ae65deb62f713514643442f77381f40dc559a25e5160148d7da039ca430d75c0c8befab55781a0519604f344364508cd4b3e3e2038e166eb2991

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4823eec416e637d403c3049d539804b

    SHA1

    711df743619cef27466541cd09dcfe51881a68a9

    SHA256

    49cc8ae5ae9001e6846b61a57b377209abc3ae5a9bbcadb1f1bda78cfd57f5f9

    SHA512

    8ab1c7e28622ad0ab5bdc904eac349c5be94769871cbb1fb159e7bd8dbcffb97abaf86c4f73bb867d383c3032c5956be4858d0b61152133abd58d255488068c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40b057fdefc611042bc492a1048d8d60

    SHA1

    104943f7df8cabd82e6e17dff95c72b6037e196a

    SHA256

    d2422c49f904483c5418fd55f3225fe3d645d35fef55508b0ee5fb03062a15ec

    SHA512

    c3f635687468a338e66ac8647c48dc5e8ec751ddb9abed6817afff950c87dff38f4e6e8225c26251117e372cd50799dcfe16cb4132b2885d31516f90ade127f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73b4dcb70f830f0e3bc18c1dbe150496

    SHA1

    f5749325dc365f70adaa6e48a72626c8349bd0af

    SHA256

    5108966ac664c0337d5ded2265ab343e42b3fcba6c55414328e8939e1ead7b13

    SHA512

    f6d414e00f42b9340913eaf260f72a04db542eb05d9d0466888eb76e73d41ebf1d3011e89e3b8dce59b71d259d48c957166bb859e828d2c1db8454f4312f1f7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75d2f758d7e19c9dc2309409e96829e4

    SHA1

    607b852f792c370eb72b3b2a6581c2854638a7b6

    SHA256

    4c776b46bb544a3ce116d0a1378f7c584d863d57045f502a02339dba14207db2

    SHA512

    e7b9b1a0c174ba36fa86f467a3901363ac844e5fefbd2e30f2fee2ba4422b99e34ff21a9760c2f8d009d4600d7b35a28b466dc05b86136a9849a07f460f7c3a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f71dd947ecba6a4ef5e1f0050f5a999

    SHA1

    4f28d994ae2324da3a7cd29305c8346422bb33c8

    SHA256

    f35184eb5d8d6816244c43de20803b1879eb20f4bd222a67faeaa826c6b86acc

    SHA512

    e93782026bb349ce46cd577029616194c9c793c704f90fbbf7c3d516c1a4389ba723efd7cdcccc0c6b9486e2a9f546033cd06784e93fe5e1e66cb4338a6a5f33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fda8fd9de0406f240b386043f45d6e9

    SHA1

    1ef1464c7fe857c9c67ac218f040f903f491d2d4

    SHA256

    480386d92068cad28b950e41791f500a29bdbe442a781447274080ac862fc991

    SHA512

    cb418baf296ba40b3961d8bf050bd839d5b5e6d73486fd8a3c3348b6c08ea91588e24f413d2fc452f55f84b929222a0f1dcc1467383c9de94aca67850af4744e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dfebad5076b2bc9d3f7a08b3791a91e

    SHA1

    d87420d0ad871b8c5d97f3790912f3e21d364eb5

    SHA256

    3febbb13417878219e191f302f59f6025db2ecff7211f4230bb3d9d2a9ff311e

    SHA512

    1e58edda9583bb7af4ddf63f088a6bd3e39bcc5e91813600b5755881ddc001e00ee790c3ea489320d3faf8f7e82c3fd497ca3ea2ee62be581379ed38843171bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a0dd13a94b17e6f7c25a081cb5543a9

    SHA1

    c86ff34c1bca4e5902b2f54a56c25751eea5d750

    SHA256

    b3d69edbdb8742b175b0fcc0d7494fbab07fd28761a89610be1e5d19d5d3333f

    SHA512

    2e9520ffe7b3a53689f82949b7c2297c93aadf693f535058a1cc19a86f2bace772e01f475a2f4b2d3ec3c17750a04a713e0132342acf684dbf0ce0d6073743fa

  • C:\Users\Admin\AppData\Local\Temp\Cab3871.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar38E2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1704-11-0x00000000001F0000-0x00000000002AE000-memory.dmp

    Filesize

    760KB

  • memory/1740-5-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2120-13-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-2-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-4-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-6-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2120-7-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-8-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-9-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2120-15-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB