Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 00:05

General

  • Target

    e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe

  • Size

    265KB

  • MD5

    e3a2512f819f37dcad5b10fe43429450

  • SHA1

    93fb5debb25d0b75e4152380430bdcc0747b2474

  • SHA256

    75836ecc3f94d6ba550f8c8c13301e3c59c52a468a79efae6edebe4f1308ae3c

  • SHA512

    0c80b7249568297b552acc5b7eefe3adc904497dd066ee4ac01632e0ccd3d5ff9115a27a12439022d9dd8b2d94a25ef6e5f0f3f2e7b4c560a5180963f20cef73

  • SSDEEP

    6144:YyB01uCflxSB8Fvhqao9PpJwfk2sNI/YSzq3zM88s73m:S1JfFMjJazi3z12

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e3a2512f819f37dcad5b10fe43429450_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c94c6abc7ca07f9db1e016c8488e930

    SHA1

    58606253b3bb5cb8713921b97672eb3b34f06241

    SHA256

    5692ee16cafdce6146471928eb7ff07e79a418139a6c5a5781fc50c5728b7a25

    SHA512

    a40a50c3b864e9a3ada04e850e5862c1c1e2f96df67f70d751589bba4e8c9a786d49c2f397f8bd120faa9cf99347940f5f1f64fd74aa89958e0a490dcd442fbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c09d8ef7180989cb311bc9bdcf23823b

    SHA1

    b67b5e91b7f8e96a4faf8fb30fe0ef7904012afc

    SHA256

    487cf15055c79b0223024a5c29ec71a8d818727f38fc6a261aea26e9fad143d2

    SHA512

    93d3b6644b3b34e8e5552225fcc16fc8e29285665f661b3d0c4294ec94a8845b6ca00cc143a4f4e7d3c33d1327c515aad7c324011c754a5705104f60d48f45c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f17b5d2bdedf35f3beca74d49648a95f

    SHA1

    9fd778b15d47ff82c069ba92ff21c831b7b86e5c

    SHA256

    884f8eb68e477f7b2be5c3c5d3822668736af24b38ec234416c786cb8298aac7

    SHA512

    87a8726bac163f3b1a76b355e9c6687431ffdf4e939e236c46c07029c5b5de105221a299b2b33d9825369ee9d8b4e3b27e7cd20735fec4b36b44da2d3111abd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7125a456a2c985acd42e0e9af11f141f

    SHA1

    772faf3d2c2b127c14e7b1ecc8d82f5596c8a7b6

    SHA256

    63b47ad72e24062b289621b55c5bfbcc99689bd2b5161f988af8801b111b3d6c

    SHA512

    255607f3503e4bfac2a39dcca24ecaeb6c806e466f802c8466f337aa65d5ea9e18e9ba125b45d566c0b3ff8171d7c3680b7d75bb777a5cc5869700bb03fabf59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a58a2e187ab76f021396312728539d45

    SHA1

    a90ee8048804c5d7f0f6ef55b5a94378331f40e3

    SHA256

    d6cb717e152c7aee30b3225bea97ea4b830b00c25ebdb215a4a2187518f94361

    SHA512

    44cd1b7a360e79eef6d06550a32ede8f8b01f61219eb45bfe9de014a1242999bccb9f5ed1f034defbe2e5d356aa1ad709f9baadfd103cda0452e58c360b999ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4c2f6005b661b09eddbcb51b4164f1d

    SHA1

    88bb537cc9f77bf44d18f90deb3a2566a8258469

    SHA256

    396670b325fe57710d1c14d39f49f0619392bf55a60c43b405265b93ea9483b7

    SHA512

    395df8fb66b71f5bdbe535cd154987d4c4b397bd583d98a4c49c018658c6f1082166248878de5b0948e3adb5c11fde3a6c1b4b55651d7aab834bb5016925e000

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1393391a831f0b2d89943a5414777f7

    SHA1

    7750716bcd7a5b4d09d7c06deee879773ee90f80

    SHA256

    5177641457f48c713380358832809665f3905ebe0f592c2d658413db09addfce

    SHA512

    1a4f63a337525db8168bf7f85406722bc87b8bfa44999d2fb41f7a25f5cd5bb0b317b79225091a4d0f4bbbc39722f16a031c80bd89ac35b4c1a01706d7ed176a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    184d7c25e56f319fcc9e8507e30a6d01

    SHA1

    7195b67bed4e25f5d1652a353da31a02fc334445

    SHA256

    e0a6eb94a657c03ca60b6dcc5a58876d1628081a293bd498bc2488dc92b5de81

    SHA512

    c78e1c8f2be9cb5b4cf111902d1e4801999b0e8788c344f183ac419396fe969c24dd826ddb808000dd7bb2c8a98b09a85b812f13b2dbb2a68abcff9a45441ea3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eef2c3007e1f6bc50ebaf2c9eae4704

    SHA1

    78ea8a5f4aa247063e0b6bf37bd6e8293bca1b68

    SHA256

    751184884fb241638476bb5f373997f1278aef4ed1b967e29669cfc1f224d183

    SHA512

    672e154cc1474853d588ece2b0ab3f99482108f7673a2e28973f95c6fc1c7ca1c8ae7c8673b78a021ea2dcb80a30e515b75a8799a833cb8b829cc1dac63b2a0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62b11cf74cba8c25f4e21c31966842b8

    SHA1

    2bd83dd065e460ff17d007b675ee4666c1e8179b

    SHA256

    ab2cf2fdc617f213e7294f2ea0b008ca804450f8df20a47cfcfa9fabffca9697

    SHA512

    32f419d190a66e73cfd682b5d67dd29a8a4c73c2a262e6668288ce1c917bf0c4d82090adb751dc837bab29c7104a3ccc6b7e508685523716d6f7ff0071551326

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d07caaa06a33a67f56fe7f2f34e35d8

    SHA1

    a78980bcd7cb7e460ee1a2ccb0f7817f47dc0015

    SHA256

    b9ba29f37fe6ecaa2ce1e9605715c9617b250c5210331e0f0c095ce533cab831

    SHA512

    4179a5af5223ea2808602e08cb5cb7e48179a19af64b95d04ffab2e9b0933385905fd97c333400f3f6f0a4eb5cb08410424956384760f6ed4d6aeff83240e5b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b93504bf59a3b6edf35010a97de29c8

    SHA1

    58336e2f51b46b238a1023ca3f040bf4b7d5cd11

    SHA256

    dc8c69b60c1af74acab143b3c28a6f277aebc1bb3a91b20077116fed3b78f367

    SHA512

    1ed0d880868d6675b23bfaa45502aa4133f68e1b263320f2f3f553922bbdeeed41e1cc15f66f42ff617a9a7fcbe70f13897f32c5ca38c49f2789567ec11ac132

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89d1303f1ee9fe8ceb586cd34d6db5fb

    SHA1

    eb9fae9943a84a48dcdda1b7f2d9b264aa069e81

    SHA256

    d2b7c0fcecb23f3a432dfb5105bedd37256c3f2987f5d973301155d834c23f3a

    SHA512

    6a5e6037117dc66397218e52417ebf39619014a665511b1b5d488b16ae58c7fe26ca5deacf1f8200334a629cc472babb93add070bb18f442cae109f97e017921

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e091691ea33bda8b1f5652826bd233aa

    SHA1

    06301b30e9d890c4c3fe534ba65363e66d87fd6b

    SHA256

    c0f3f2dee9fdd951bb3893b93e07b8de5a0f80f89ba5dabd6902a0249ba6ca3b

    SHA512

    cf3d26e170434fc65bdf48179a21e0de04c1f1d594673c9b06862e2ee48536e81df6782e8e9f26b720362681b524428498a6ab1709df44943574d2ca7fd13e19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fad0041db0b146ced065f09430742e2

    SHA1

    96fa4944fde8e747c51ba2ea8c427706481627d9

    SHA256

    adc0212c9ae8d8b896007217bb655da6fa0ba3d9f8b3dbd6f32a34d563567433

    SHA512

    8af1f03aad3c4f6fa2877980a27297ef43022641559c9c8d4e5896a3fa2c7d6d870a07ba15318ba69516cf4d29b57e40e9560a5ec45171f040ac7ce8c0d75e27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fddd2d6ffad231200522b4196d15c759

    SHA1

    e07271cfdfa84b51c801a31878cc4b0fb0c7dd7d

    SHA256

    47a21daa08593277c95bda734f2f8bb39540de2ce334379c216cad51b7c64b37

    SHA512

    93becbd72936a79cd7e95f4848277b34f89361afc3efe5a5fd88a791fc48284ba6a9d0d00cf4230973b123f599dd72df5600b8c135af0270b950935c0161af2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b48d00c94c107701491cadc894c5904

    SHA1

    44bd768cccc44de2302ff796ce706759fd91d26a

    SHA256

    4571ba27ac0d15471e47e9ef931e41b8dfbcad8436d58105a241125ed8db8662

    SHA512

    ea0e05ac02ea0bf214c85dfeee67f57c2217e7051c2b63e4114e7e5fd53dd78ce634a741544f4318d493d40b06e0756c045eaa1cd9b3e58533066a6a1fe61940

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7347615a9d04159ba1c678f20896dd4b

    SHA1

    203288696f5dd2a5c750fdeedd3fab170413e85e

    SHA256

    03555c10f710b0d40332cc9f20c8fcfcaa8ec76ab99b5e5c9c7eb8196e97b210

    SHA512

    0530bbb95608ec4a81e102ed341ddf1c3fd775f80db727e8f68f15862b125941cecbc394665632e06a67674fed84590ea74eac0e6fc97912ca4431df52fa202d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bff6f0380768b02ec87cb039a4473c1d

    SHA1

    e2f812064091af7c78cbfadaef49f986befd36dc

    SHA256

    31b6d0e569e3f5f340177c69ca41addbe3a2f797fdc813f8dba2f3ade559ad63

    SHA512

    b5142535ee5acedd2daab685c921b840a394ff7cb64b306551d8033f78e465b3d5392bc9f2fd028736b1b0335fb26583024d09c846b946bd4c1c4dd2c617786b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    008de0a13ca36ad9c695f9c0c150cc8a

    SHA1

    e190b54259f0f8f06caeecc76a82cd2ec8a6d344

    SHA256

    924d79a73e62133913523c9ebbdedbb0273fafd2160e4e9ddb6fafadd2343d88

    SHA512

    f72a5aa9f8f62b1651a9207452e71f7640292ad1c5a273967f05935f822b7c6a28ade2b86a990d8f6efd65202d0fd2f8f420015e5814e6c4178cd7c53425142d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f50942de3a14d969e777a80876d0736

    SHA1

    c9dbe3a9e19d752ba26a8a7423291619cee0bf65

    SHA256

    1bb4509d016346a8e070ae907fb3fbeb41add99516b46932e9d73c520c68daca

    SHA512

    4bdb6a83f5fa5a0e8591e3d51a7a7862caf9b1c73806805ec98e64659f8f303de86157aae2602a2976067c58faac5e1d8ad0658e5aef36120b780ee3fe90486e

  • C:\Users\Admin\AppData\Local\Temp\CabA1BE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA21F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1032-1-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1032-2-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1032-5-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/1032-0-0x0000000000400000-0x0000000000504000-memory.dmp

    Filesize

    1.0MB

  • memory/1500-4-0x0000000000060000-0x0000000000164000-memory.dmp

    Filesize

    1.0MB