Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 19:38
Behavioral task
behavioral1
Sample
e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe
-
Size
710KB
-
MD5
e3406bd3d3a10aef19381d5e576f628c
-
SHA1
38cca721b5d65b36bf15d0ac6192f17cb83fac73
-
SHA256
7e94b854738cea2182de5c654f671bccbbc8ae27f9b7d6857f63e59485c92147
-
SHA512
b9d5103b33e96b866eb3b744e1975419591e2ab94cd2dd2cff502adf30730a7fce9ade8267f01a392189201fc7ccb4c6563a591deaba589427a9c49fecfbbf92
-
SSDEEP
12288:ntS5RTQ7aT7YilhjzAF4gv6tMOAUQJ0xkaa+MptAT+pK:tc22T7BRS46bOAUrWLvATZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2072-2-0x0000000000060000-0x0000000000118000-memory.dmp modiloader_stage2 behavioral1/memory/2012-3-0x0000000000400000-0x00000000004B8000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2012 set thread context of 2072 2012 e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1E635981-739A-11EF-A97E-EE9D5ADBD8E3} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432590992" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2072 2012 e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe 30 PID 2012 wrote to memory of 2072 2012 e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe 30 PID 2012 wrote to memory of 2072 2012 e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe 30 PID 2012 wrote to memory of 2072 2012 e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe 30 PID 2012 wrote to memory of 2072 2012 e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2028 2072 IEXPLORE.EXE 31 PID 2072 wrote to memory of 2028 2072 IEXPLORE.EXE 31 PID 2072 wrote to memory of 2028 2072 IEXPLORE.EXE 31 PID 2072 wrote to memory of 2028 2072 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3406bd3d3a10aef19381d5e576f628c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b848967b10b421fa32238c6038d87f0
SHA13cd199299f5f8f5adbc7b9958c4d6d70faed1422
SHA256d78b1b6a3ed5740e00fc59de8952f2d4a3a1830dc4ac76c07e498b4dffd6ca53
SHA51292219ffb3c136a324a7f089165f3dbc36c5a5bec7588b80800359d7d782c8ed802c162cda65dc4effd84946802ca3f0cbb595f4ab0b4da0d29bd5a69f40ca97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d615b2ca7db391616703cc28ddae928b
SHA1c4a3ad7c8540eb22e03a873df39b861a5e49bd79
SHA2561f64416750ceb7387bdce9d38c97122f64efbc856c00e13e703ec0a3cb0b1f0b
SHA5124a4ef57680cb87801b402f6e2c31df896137ae4b415f868d1c6c17e0159994315a0213f99972b7686776f8be997b65986fda86bf863d40f2f63cc0f5406ac2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9adfa4037507234ab46fa5ed125c5a
SHA187905b4b6044847a929e8473541eab2775cfaf8f
SHA256ffbfd02eaab41a1523287f0088ce3b31588d8565a427749f06996ba132ecf9d6
SHA512b42862c60ec0b78dbf3870817e4399ab22a305c212d8d9909ef9eac49973171005a617e8ebff55b76af458c5a187855d9cd8cc96982bca1bb0a1e30e3e52a709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55177efe48825b9853b51a110c85122f3
SHA18473ba0b3db532b4ed28832ace439f78a69729b3
SHA256b3edd26ad126905dd34633bb20a5b78b1c4f87bdcd11a9238e1ac789fb95a180
SHA5127729c969bd8d3ac4f3722ddcd474ec22eb52bd28ac9b5dd0c4f1f6433657f61b7a63977fc07328b3d871d8f96fb061504df1ba496d0f668212dddd4873cee899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859f0629810d5d4d1d5017d58bf484d4
SHA1c87c2e07dc25873fb72f33511eaa07b7b8303d7c
SHA2569d5b3562ad223bcf8ec3ca2206aa685e1a0907185a09981579b4e72fe142a812
SHA5120a3f320a24826b2571924452535f236118eb77d957e2d3ac682081249089b8cdbf367dfbf5eae259c5a6b259026a4f1eede3106e79118de6d7e1a65e976ff7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671cbd90b43d5aa76ba30f8c72130333
SHA1b7e2ece09999e21c55791ad6a70791f190e41611
SHA256530fd84c137d5db6ed09e9059de51fd800c20549aa4ead1185ca1b2232e88c4d
SHA5126b9255c4d76b2c3f80ddb27d12dd2e0b57df3f2355b430cc04f2bee5abf27f889e6880e8f995ffa8f09b51c04a6778fad2cdb61c0ab01430dc4bedc83786ef92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5bc8a566d69f1c6d18be855ce66725
SHA1385a628ff70d9729626b731b2384b02338db869f
SHA256bad51828508b270ab4aa8b9af99a018933a832ecb5a8659e793b6bd2f1d98f02
SHA51295d2e862a4ba98202a47db9b1b31c257b1d86bd0da0311d4086b538ebacb35d6511428deb3554f54b288be2e8725bbf54ce5bdd5d932bf0c6e8324b256cefaf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8937d6f95849bc516d8051dccd45455
SHA16b2e16313f39269136a5f64e0a95beed24364759
SHA2562723909d71780958093079fc46d56e4e18a3f6c572693fb95f865daf6c1f2497
SHA512fc183a1afb510e63a5dbe2e13d7ab12347b20f545f996f1ee32ef565599b71af1f12a3ac3750312de0e5f9d9b91e32ead3b8dcbce76e5f1b1e278a17c1cd97d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d60d2222bbf6af390731bc95ec2dfb91
SHA1f2c4b8ae976877eb47a0e4f3d575d28ad5295d7a
SHA2565fc54b6a2bc7a64fe9d02b76500d4fb93d6f46c2eafded8859d2098593ea48c7
SHA5123ae425dc20e42865f937348828a8b6a38e52da8f1747a38d41ea051e299d3bb847ada6d40932d3ed7d3516f43272f49618dd9aff782125a2690783a166520b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ca202ae38fe6482c3ff4a2957a782c
SHA13dbf796a1a621fcea12773dadce708de4820ca65
SHA25657b89f32d4ec169ee0ebac6f8b51250bad3c3ebd0d2b103f303e09b5eb4da4d5
SHA5120ca25fae17f7a442bbc3272e7ee390c1b06ecb35c7bd99a7a8ac522c004ef0f179e3ff10f418752a1e6f34e577b9722f317b101966bb1d81b4d0381f4ec2c273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3b8e4238bfa1bf9624e3055f5a3dc4
SHA18b7262e59d0ded04b411f296931d440d1b2b1325
SHA256d088862e68c9af9ebd8a125918f867ca53edee47ae90e77f95bc917b478f3d88
SHA512f15cb3ae664a4b3c12387b3f6b8134c26719bb72e66c03e661978d474b355496b75cacb21a5b12267c2645e8d3f122751db7095027e96bf0a00bb8216dd6f240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2fc71fae9f596ff92176bda20938ea3
SHA1aed08d1f913ee0eefc821d26928e656305e213ef
SHA2567785fc7cebc97bbd6da5ccd0417052c03aa9d0eb28280d36668c2740184318ac
SHA512b6d6c7a8d4b477d37613352f838a7f1cd906aef4ac34c9ad575165f442b363a084230cda89cd65dc5b6a6bd4b70fb1156e30c0e5f5e6d811c33864b3e4e6441f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c79e828dea3b0f4837bfa7d56b1f63ca
SHA186494b838fbad84d9d787fd6ce6f11cad6b2d11c
SHA256198232175b8c10d01f7d4b578a7e4fb1e111ab7272a0beac76d8199aba5cc10b
SHA512f11178f6ff222ce7d961a526baadcc74610408b4dea40d772c203d35cbd5ee55ff3ec5afba63e48edc8422493992181e8dd0762303bd66d2993c7527c39edddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b09a01e4c14216638b436cf4afc384
SHA14ff6d856084cc189215d87cdc145935c798acf1c
SHA2567d3e450eec436b60f75f92916352c0d5cbc939ac06e6cf728cd726f1c1aab184
SHA5120691243800b2090a72104024beed6a116f48b69afb3165ce2c6d689db559172c2176981ecb8c23a7d41727c60f4043c73b768da762ba7439475da7c82381ea5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea0ada04a2181477d92ad21d3a13a11
SHA11ef3d6f3a75da64d49cbe3a7a5734543eb5c6d14
SHA256bb83a83fb374eb33f4f534160d7fa3411c55dfbf221b9d7b12689be810534c31
SHA512ddb3376440a0737d26dca0fb10f8251ad77cdbcdb26bddd305e24cb791defbd22a55773d8683854498da983e942a4094e52d54a03042bc13f9f6c002b74a4351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50983538c80a50eafc4abed194648628e
SHA1467b33982bff477e650b4e94bfa096e18d58f30b
SHA256c744d98cfe3cae5ee2fe7f32ad6d94b28e3e738b40e9a0ee69a799154db9c9c4
SHA51223c80f7a6c9b3c637e59a323d29e8f44d12c5735d3eb6c7fbdb719c7f877733f466436cc6161dd81c793ae12b213ea180b9f894f7cb3d2f8135b8c9602e2718f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfc0acfb053254230da0312c5de2954
SHA189a713b97f2376440b3843f4ea94b9787d58e047
SHA2564286a77efad5d8013c3722bbc77d1ed8894d19e30ef916420af6596c42778505
SHA5125a8db10e63c3907eb3d18a03f1d0cb036ca0b456b826c19ebd3d1c78e7c14a0dc0827fd39ab3598b4659357c3a9c7f3789b57e988749631395d6e3952309b866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4f849b23f91f90f703c485ab8d6aef8
SHA12d515435b73c02fd7d482e7e4817ca3c378ed063
SHA256759f3f15ea23bf289619c9d6ffea4cbeb5b8802666bb1af52673015d3d2d092e
SHA5120f2ca542ed6d4a3ce377ac8a4e25cad7935284dd917fd105f7ebf2182f8a775f0e9c297ad1dd1e90f854b8b294763df6651c47a1cd5023c5d57cb540f37452aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a57775643477b0693fb6f764587e9b7
SHA18e863ce013501d0553e17be7a77ab3901b225f4c
SHA2567a23d727c8b0f0d0235f1eb4143b4d60e4d92565734dc18f3f010e0eaff1b5e9
SHA5121a629033d48abaaad7156515f2b9978fee831bbe774d82cb6fa3046944f587f381dfddfc5ca122a12827a1855674583323bba7368b586b6426869b527cce5dfe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b