Analysis

  • max time kernel
    118s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 08:05

General

  • Target

    e4562ca086e117589c6555e779559753_JaffaCakes118.exe

  • Size

    727KB

  • MD5

    e4562ca086e117589c6555e779559753

  • SHA1

    f3386b7ad8f2c668a6f585645e4af160439fcd79

  • SHA256

    ae1dfb23abbf1226e7e1451fc5b9b7e808cab589676dc995e191b1e689c62f94

  • SHA512

    4bdfd624de54f4f488c10922d576f91be31d7301a46886f9c33e8efc9bd662cb63d2712be184db12e4b9c56656ed22919d52df013a9e00c1f19eafd8df78b348

  • SSDEEP

    12288:K2zuWjAbW+MFXZuCSKFlcP4JwjvpwwW7/Vqk9OgNEpp3JW6uj31MDaOvDa/IFM:KmDAbW+s/FlcP4yW7Mg6uctLamM

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4562ca086e117589c6555e779559753_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e4562ca086e117589c6555e779559753_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9231278b05e35534f4d31c900d7fb76

    SHA1

    56c001966183ba79a4ab7b43b0eb1be52745badd

    SHA256

    415ef603067c21a1363545daabd10b8a9582235f95defdb16c7bc213a1869f78

    SHA512

    692abc6591802c8e653a9e56fa4838f08e056636bd2d9192c1a8fa17ff6d90f3030be3e49edfc0459e39ec4e0302d36eb50eb202ad5c6904279d3f0b68c06cab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a017d4de3da632676fd2760da4d5d3e8

    SHA1

    70089fffde71d98e18b861363cc10115f1f4d5c9

    SHA256

    62f40a13bf1fd0be81a3ab2244796f1ee07e3de1cc34b532f489d571656d9db9

    SHA512

    f4e4a3701d9c0c387a55ccdd32bee79e4e908a50556ea14866babfcc8c3c575c6f7aca2fe385decd1083eec105642498308743ef2554d7c845f2350a48829bce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04e73d9e6944af459ae965ae70f15102

    SHA1

    16bdbddf75a7ed7c5fd7f61150fe564dcb0bf675

    SHA256

    6305b6942ec31d9c8f1601c67e3799625a7ec0e71bf4cc5df3e19541df53549a

    SHA512

    9df04fd692ad1a71d995e74a7fe4784406144c9b2567c50747ac021f13ec8d86987a41716fd02d708b7088d2809be11507163cca1267058062259f9ccbf1ab61

  • C:\Users\Admin\AppData\Local\Temp\CabF162.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9E6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1964-12-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1964-8-0x00000000024C0000-0x00000000024C1000-memory.dmp

    Filesize

    4KB

  • memory/1964-23-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/1964-22-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/1964-21-0x0000000003530000-0x0000000003531000-memory.dmp

    Filesize

    4KB

  • memory/1964-20-0x0000000003530000-0x0000000003531000-memory.dmp

    Filesize

    4KB

  • memory/1964-19-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/1964-18-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1964-17-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1964-16-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1964-15-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1964-14-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1964-13-0x0000000003440000-0x0000000003441000-memory.dmp

    Filesize

    4KB

  • memory/1964-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1964-11-0x0000000002470000-0x0000000002471000-memory.dmp

    Filesize

    4KB

  • memory/1964-10-0x00000000024E0000-0x00000000024E1000-memory.dmp

    Filesize

    4KB

  • memory/1964-9-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/1964-24-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/1964-7-0x0000000002450000-0x0000000002451000-memory.dmp

    Filesize

    4KB

  • memory/1964-6-0x0000000002460000-0x0000000002461000-memory.dmp

    Filesize

    4KB

  • memory/1964-5-0x00000000024D0000-0x00000000024D1000-memory.dmp

    Filesize

    4KB

  • memory/1964-4-0x0000000002480000-0x0000000002481000-memory.dmp

    Filesize

    4KB

  • memory/1964-3-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB

  • memory/1964-0-0x0000000000400000-0x00000000005C3000-memory.dmp

    Filesize

    1.8MB

  • memory/1964-30-0x0000000003430000-0x0000000003530000-memory.dmp

    Filesize

    1024KB

  • memory/1964-33-0x0000000003430000-0x0000000003530000-memory.dmp

    Filesize

    1024KB

  • memory/1964-32-0x0000000000400000-0x00000000005C3000-memory.dmp

    Filesize

    1.8MB

  • memory/1964-31-0x00000000003A0000-0x00000000003F4000-memory.dmp

    Filesize

    336KB

  • memory/1964-34-0x0000000003430000-0x0000000003530000-memory.dmp

    Filesize

    1024KB

  • memory/1964-25-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/1964-26-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/1964-27-0x0000000003430000-0x0000000003431000-memory.dmp

    Filesize

    4KB

  • memory/1964-2-0x00000000003A0000-0x00000000003F4000-memory.dmp

    Filesize

    336KB

  • memory/2940-29-0x0000000000310000-0x00000000004D3000-memory.dmp

    Filesize

    1.8MB