Analysis

  • max time kernel
    134s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 19:38

General

  • Target

    e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe

  • Size

    710KB

  • MD5

    e3406bd3d3a10aef19381d5e576f628c

  • SHA1

    38cca721b5d65b36bf15d0ac6192f17cb83fac73

  • SHA256

    7e94b854738cea2182de5c654f671bccbbc8ae27f9b7d6857f63e59485c92147

  • SHA512

    b9d5103b33e96b866eb3b744e1975419591e2ab94cd2dd2cff502adf30730a7fce9ade8267f01a392189201fc7ccb4c6563a591deaba589427a9c49fecfbbf92

  • SSDEEP

    12288:ntS5RTQ7aT7YilhjzAF4gv6tMOAUQJ0xkaa+MptAT+pK:tc22T7BRS46bOAUrWLvATZ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b848967b10b421fa32238c6038d87f0

    SHA1

    3cd199299f5f8f5adbc7b9958c4d6d70faed1422

    SHA256

    d78b1b6a3ed5740e00fc59de8952f2d4a3a1830dc4ac76c07e498b4dffd6ca53

    SHA512

    92219ffb3c136a324a7f089165f3dbc36c5a5bec7588b80800359d7d782c8ed802c162cda65dc4effd84946802ca3f0cbb595f4ab0b4da0d29bd5a69f40ca97d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d615b2ca7db391616703cc28ddae928b

    SHA1

    c4a3ad7c8540eb22e03a873df39b861a5e49bd79

    SHA256

    1f64416750ceb7387bdce9d38c97122f64efbc856c00e13e703ec0a3cb0b1f0b

    SHA512

    4a4ef57680cb87801b402f6e2c31df896137ae4b415f868d1c6c17e0159994315a0213f99972b7686776f8be997b65986fda86bf863d40f2f63cc0f5406ac2cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a9adfa4037507234ab46fa5ed125c5a

    SHA1

    87905b4b6044847a929e8473541eab2775cfaf8f

    SHA256

    ffbfd02eaab41a1523287f0088ce3b31588d8565a427749f06996ba132ecf9d6

    SHA512

    b42862c60ec0b78dbf3870817e4399ab22a305c212d8d9909ef9eac49973171005a617e8ebff55b76af458c5a187855d9cd8cc96982bca1bb0a1e30e3e52a709

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5177efe48825b9853b51a110c85122f3

    SHA1

    8473ba0b3db532b4ed28832ace439f78a69729b3

    SHA256

    b3edd26ad126905dd34633bb20a5b78b1c4f87bdcd11a9238e1ac789fb95a180

    SHA512

    7729c969bd8d3ac4f3722ddcd474ec22eb52bd28ac9b5dd0c4f1f6433657f61b7a63977fc07328b3d871d8f96fb061504df1ba496d0f668212dddd4873cee899

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    859f0629810d5d4d1d5017d58bf484d4

    SHA1

    c87c2e07dc25873fb72f33511eaa07b7b8303d7c

    SHA256

    9d5b3562ad223bcf8ec3ca2206aa685e1a0907185a09981579b4e72fe142a812

    SHA512

    0a3f320a24826b2571924452535f236118eb77d957e2d3ac682081249089b8cdbf367dfbf5eae259c5a6b259026a4f1eede3106e79118de6d7e1a65e976ff7aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    671cbd90b43d5aa76ba30f8c72130333

    SHA1

    b7e2ece09999e21c55791ad6a70791f190e41611

    SHA256

    530fd84c137d5db6ed09e9059de51fd800c20549aa4ead1185ca1b2232e88c4d

    SHA512

    6b9255c4d76b2c3f80ddb27d12dd2e0b57df3f2355b430cc04f2bee5abf27f889e6880e8f995ffa8f09b51c04a6778fad2cdb61c0ab01430dc4bedc83786ef92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f5bc8a566d69f1c6d18be855ce66725

    SHA1

    385a628ff70d9729626b731b2384b02338db869f

    SHA256

    bad51828508b270ab4aa8b9af99a018933a832ecb5a8659e793b6bd2f1d98f02

    SHA512

    95d2e862a4ba98202a47db9b1b31c257b1d86bd0da0311d4086b538ebacb35d6511428deb3554f54b288be2e8725bbf54ce5bdd5d932bf0c6e8324b256cefaf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8937d6f95849bc516d8051dccd45455

    SHA1

    6b2e16313f39269136a5f64e0a95beed24364759

    SHA256

    2723909d71780958093079fc46d56e4e18a3f6c572693fb95f865daf6c1f2497

    SHA512

    fc183a1afb510e63a5dbe2e13d7ab12347b20f545f996f1ee32ef565599b71af1f12a3ac3750312de0e5f9d9b91e32ead3b8dcbce76e5f1b1e278a17c1cd97d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d60d2222bbf6af390731bc95ec2dfb91

    SHA1

    f2c4b8ae976877eb47a0e4f3d575d28ad5295d7a

    SHA256

    5fc54b6a2bc7a64fe9d02b76500d4fb93d6f46c2eafded8859d2098593ea48c7

    SHA512

    3ae425dc20e42865f937348828a8b6a38e52da8f1747a38d41ea051e299d3bb847ada6d40932d3ed7d3516f43272f49618dd9aff782125a2690783a166520b4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6ca202ae38fe6482c3ff4a2957a782c

    SHA1

    3dbf796a1a621fcea12773dadce708de4820ca65

    SHA256

    57b89f32d4ec169ee0ebac6f8b51250bad3c3ebd0d2b103f303e09b5eb4da4d5

    SHA512

    0ca25fae17f7a442bbc3272e7ee390c1b06ecb35c7bd99a7a8ac522c004ef0f179e3ff10f418752a1e6f34e577b9722f317b101966bb1d81b4d0381f4ec2c273

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e3b8e4238bfa1bf9624e3055f5a3dc4

    SHA1

    8b7262e59d0ded04b411f296931d440d1b2b1325

    SHA256

    d088862e68c9af9ebd8a125918f867ca53edee47ae90e77f95bc917b478f3d88

    SHA512

    f15cb3ae664a4b3c12387b3f6b8134c26719bb72e66c03e661978d474b355496b75cacb21a5b12267c2645e8d3f122751db7095027e96bf0a00bb8216dd6f240

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2fc71fae9f596ff92176bda20938ea3

    SHA1

    aed08d1f913ee0eefc821d26928e656305e213ef

    SHA256

    7785fc7cebc97bbd6da5ccd0417052c03aa9d0eb28280d36668c2740184318ac

    SHA512

    b6d6c7a8d4b477d37613352f838a7f1cd906aef4ac34c9ad575165f442b363a084230cda89cd65dc5b6a6bd4b70fb1156e30c0e5f5e6d811c33864b3e4e6441f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c79e828dea3b0f4837bfa7d56b1f63ca

    SHA1

    86494b838fbad84d9d787fd6ce6f11cad6b2d11c

    SHA256

    198232175b8c10d01f7d4b578a7e4fb1e111ab7272a0beac76d8199aba5cc10b

    SHA512

    f11178f6ff222ce7d961a526baadcc74610408b4dea40d772c203d35cbd5ee55ff3ec5afba63e48edc8422493992181e8dd0762303bd66d2993c7527c39edddd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8b09a01e4c14216638b436cf4afc384

    SHA1

    4ff6d856084cc189215d87cdc145935c798acf1c

    SHA256

    7d3e450eec436b60f75f92916352c0d5cbc939ac06e6cf728cd726f1c1aab184

    SHA512

    0691243800b2090a72104024beed6a116f48b69afb3165ce2c6d689db559172c2176981ecb8c23a7d41727c60f4043c73b768da762ba7439475da7c82381ea5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bea0ada04a2181477d92ad21d3a13a11

    SHA1

    1ef3d6f3a75da64d49cbe3a7a5734543eb5c6d14

    SHA256

    bb83a83fb374eb33f4f534160d7fa3411c55dfbf221b9d7b12689be810534c31

    SHA512

    ddb3376440a0737d26dca0fb10f8251ad77cdbcdb26bddd305e24cb791defbd22a55773d8683854498da983e942a4094e52d54a03042bc13f9f6c002b74a4351

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0983538c80a50eafc4abed194648628e

    SHA1

    467b33982bff477e650b4e94bfa096e18d58f30b

    SHA256

    c744d98cfe3cae5ee2fe7f32ad6d94b28e3e738b40e9a0ee69a799154db9c9c4

    SHA512

    23c80f7a6c9b3c637e59a323d29e8f44d12c5735d3eb6c7fbdb719c7f877733f466436cc6161dd81c793ae12b213ea180b9f894f7cb3d2f8135b8c9602e2718f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1dfc0acfb053254230da0312c5de2954

    SHA1

    89a713b97f2376440b3843f4ea94b9787d58e047

    SHA256

    4286a77efad5d8013c3722bbc77d1ed8894d19e30ef916420af6596c42778505

    SHA512

    5a8db10e63c3907eb3d18a03f1d0cb036ca0b456b826c19ebd3d1c78e7c14a0dc0827fd39ab3598b4659357c3a9c7f3789b57e988749631395d6e3952309b866

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4f849b23f91f90f703c485ab8d6aef8

    SHA1

    2d515435b73c02fd7d482e7e4817ca3c378ed063

    SHA256

    759f3f15ea23bf289619c9d6ffea4cbeb5b8802666bb1af52673015d3d2d092e

    SHA512

    0f2ca542ed6d4a3ce377ac8a4e25cad7935284dd917fd105f7ebf2182f8a775f0e9c297ad1dd1e90f854b8b294763df6651c47a1cd5023c5d57cb540f37452aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a57775643477b0693fb6f764587e9b7

    SHA1

    8e863ce013501d0553e17be7a77ab3901b225f4c

    SHA256

    7a23d727c8b0f0d0235f1eb4143b4d60e4d92565734dc18f3f010e0eaff1b5e9

    SHA512

    1a629033d48abaaad7156515f2b9978fee831bbe774d82cb6fa3046944f587f381dfddfc5ca122a12827a1855674583323bba7368b586b6426869b527cce5dfe

  • C:\Users\Admin\AppData\Local\Temp\CabCABF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCB81.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2012-3-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2012-0-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2072-2-0x0000000000060000-0x0000000000118000-memory.dmp

    Filesize

    736KB