Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-09-2024 09:55

General

  • Target

    e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe

  • Size

    735KB

  • MD5

    e68f3efd5ebcbc21d8d73cd9d5358e85

  • SHA1

    193c5a0973ca48c30348144bbe8462f6cccdc17b

  • SHA256

    9edec74491e7e7be8b39853c34cac3fb84e247bcac3ce4b7ebefc75087407bfd

  • SHA512

    08fbb6dca35670bef23497eb86aaf659c3f5d30dd5835ef39ce9ce266c44cac5d231974034d2a5d7e3a84fb455b330b5f95f065ad21803b6a16394b58048fb9c

  • SSDEEP

    12288:uhc//////HkPYyIJujiIH13mcwtbkElgCTED2W9isRyYYxO3HQ0HTxOVc2qH0XZP:Uc//////hIiq2Xtb3PYgs53BHFO62pXZ

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3881304abbed6ca09311fc0303ff21f

    SHA1

    93ee97a3af695cfb78bdcdbf27b3c9b34d904f04

    SHA256

    50839acce9990d0d3763beeb4ebed3434a0a917d8e227d104e5a8602c8b23d0b

    SHA512

    161cb810ccb83cb50e9182688ec32b105e2758d14e9b9fa8782500f8934da8e0d78d9a5f693ad338ee5be2f8b1601c92b0f0a9f73833cddc24ba7474879ec9f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99b937dc4fb43d6c58106ce8d67479d6

    SHA1

    452e65fdb710f91cdd6e15c6a1cc666537a16b26

    SHA256

    f22f83adf7d85bad27ad3905088a124d7fb211909def702e515f196d53ae7d8b

    SHA512

    c6ff920975fe9db3be811e839cfce631ea4bd143317c3a13532f6adff156b60e74c22e822d003f24ed762f8b8802d3bd79f02ec66a23989e7b5ae0212aa423bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70a1c061e96e866883f7b08920f95b40

    SHA1

    813f471c81a0e54433abc5f2c9834d1f0a835708

    SHA256

    42ecf73015f2c7ad836ad95a2b830b13f8bdc55c95be2c781368fd1330918070

    SHA512

    2b37b4dfa528bebad8ce2258466630b1bdee4870453686aad9b35272d90d758a0d6c99a9dd86014ea17c7d2194ddeed94f0d9d9a9e7a1ac960cda3b81aa6f0b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9206915753c15e39bd540493a403ba33

    SHA1

    7c28b4d1771e7ca80ab59885451f0296271543eb

    SHA256

    3a366cd2c8502adc25e964209815b6078a4b9c976c227d1f91e1896e4763f923

    SHA512

    8248052e2f2d0996d234d0d7b3faef206097a67951c8ec1e375ecd3a9035107e4907ecab2cb0f314da9d5d010c6fb46bc324fc1fc705a1238ff197d7b7c12342

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e228e2971b8b2fbecaa5788873eabeb0

    SHA1

    b5a736be98dca9cbd567ae16645c3b199069dc1b

    SHA256

    e4567f21793d261cd7cdea43a27969b317d1eff1fea635dcd48fcdb8af4c54fa

    SHA512

    bd4d8a9032fca5ae9a0576a632ed01257adcbc1beff9af715caf94dc98007a49a1c4928110c458bc9f77bf660a1ab24405b6b6724fe75bf55909f20594c17494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a36e4d430817fa9f09e7d532a22d0967

    SHA1

    d5a3bd0feed169d3b4037f7bc2b66d00c12046fe

    SHA256

    0f8112aa92a40e9db1d28ac28dad0745243db9edba99401e6194ee7ab45edb55

    SHA512

    cefed679f0c64ec3a3d420a2b787627beb6be720071e73b58de18710d64ef5552ce0533aa70594506219fe090aabaf32af77af4f4639b86bc55246c5c2a2613a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25d0853fe861ca711bdf109c954e8e29

    SHA1

    8441641bf8cf3d7a5c1978279cb09773e122cbb3

    SHA256

    b8c84b5319a2a64aedcde4611853366da9508fbcd71149a2e3962defc3ea5075

    SHA512

    100ab108a39cbd42c886fc3bd5acf10059475f8f335d4d2ccc53c4eb70618501314a30dfa28b0b282f2a28a13e8fa0c0510f2c7a7e110e71c854d293cc9cddde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b30c010bb98b64e4e5fb34c9da8c90a

    SHA1

    da74ab60f95765699936d1be9868745ef35ba468

    SHA256

    51f20da3841fbb60cbb58d73a024ed89ee02ef665f2ff5a33d812ea56457c79e

    SHA512

    4fa7e766f7da69647aa9d46ddf1460177978de08fbe8dd2cfe7e32905eb539ce6a052ce46cd5a246114b2505c23c6343226ed30ab6cf5f851185766bb811d8e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f5d8fb5c41114496d621c44fa3a8426

    SHA1

    9083154807b94e47f7031a91b216d0ba42904256

    SHA256

    df8d8cbbc5bbfa05f097588662a0c56ddab156442b7ee5306e3d944fb545a767

    SHA512

    075d040f0d932d1382e316af03c6335edb8590cb98eeb7055f64b2eead902edd4b1b28d3690417a84a868170ad07df361d4a30d0203ade7fa3ac0b4ea404a3b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e0365e5680641e9a58db17a459eb478

    SHA1

    641a7951e312797ee20763521639eed1a84fad3f

    SHA256

    70ae9a9e094393a2b78d0651732d5acd3ab739e0fb2910f879f48deede59ea90

    SHA512

    66c9bbaa7bf35fc59fd74e81511c3955af9bdddd3a89d5897d15b22ee94ff426fc436b9effed9694913a5b4b1fcfd8da018d1ae2a28e5f9d2c1de15750ef5637

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9292fce72ec253768558d81f15603ccd

    SHA1

    e9995f0151c718a4751c8c226cc5e3d420612b74

    SHA256

    22ad7e3da6f2dd792af0970d39a55abc7cac9c1a934dda9fd5e23f4668986455

    SHA512

    35219db926a1e2d6711cd9bac74a41b30ee0ac5fae85941775b984a929a622650a95a9e832bec8c624457d804a6feb15368d63d26c987440fcf67fed1ec52840

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b63ab6d3a3ce129bb675ed521bdcc5ce

    SHA1

    8b05ec95476234492636b36923ac85b3489867d0

    SHA256

    df162845da6505b06d16732285804782d0a7219fdfaf4781e573e3d6c6b6caf1

    SHA512

    3edb80fa495f242f02a8757aa9d5d7680958fdb45ca6b05249420574bd91b4dcc727fa908e17754617b058bbd1cc8dda03ccb0e96119db48b360f1d567d9b74f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0465058908d4df232e1c2c8cbc86142a

    SHA1

    7308b136348c646174ffdc6eda4a4bd7a8581e3e

    SHA256

    02fb8026dbbed1215ee944ef30b6b5029123f703ed5b70a36d774398eaedb276

    SHA512

    7a3dae6072e90ccb25844ed4836e294e72d4bcc36842a7d4325eee76b77cee3d04d12baba37456a07acd14c2a7eaf3a2c095b778c37f84a9e29e774d7126adb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f79b90c2824191d8bfaa2b535d809b3

    SHA1

    0d1a9d1a0d4e02ec50135ef4b180dbad240e8691

    SHA256

    378e5205b2d7fb8456f42785f87ad3ab8cd7a6ca814b5a945399f4d38d4304dd

    SHA512

    a7af1b2ddc4ab5fbd8a0a82e1ba76da928dda25ab9733838f443957f4f680b5bba975ef9dfe3a3d499c83c5ac87ec22291348d07ebd48f7f3f9fec7c8e47cbe9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    817c597be29f7d6c08d1f69558f2202d

    SHA1

    bbda36b1cd6eb34061d9731e2c98adc500645595

    SHA256

    40520060cfe30e7c48a498bcb5882478d36ba89ca86b698d4bb30f6f1b3871c4

    SHA512

    cbcd1567839cb5e35cc420035bfa417e54b19b61d2bbc63b7add8793e22fa9465af62c52166ed079ddebcbf3ea1dfeeb021f780041b4f241e3b2b784130f52f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    335d8078a80c2953380a6ae827f2e5cd

    SHA1

    66efe07e528403c541cc7cf412895bca37235ff0

    SHA256

    318bb2ab1829fa11489f6d3c3084bb95248ecebbc6428be4bba9895bc9ea2f2e

    SHA512

    089e7f9eff9e03a11c0460956046e6dbeb301aa0d93330b80fd822f430104d82b5ef5b8ffd73bd74dc8c49a6a4068d9f0698f4c5264ea86e9741b7e018e48f40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2e7d518661a7b87e7d0267f62f50126

    SHA1

    48f2205aa1efe0c98ddfb671b3a0177a158c8447

    SHA256

    d5ab90a56c95197ecd538417a2c5bb33c1792fa3153c832a89b4c567d69c49e3

    SHA512

    e3d388a089361d7d938db2451cf82d26f938c86fd636bddb361af6173927deb09c0ecd8090c5fb187434a22224ce81f87536f3e95aadaa7f529f5e3cab9615c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13dead82ae1418a40405ea5cbe7064b4

    SHA1

    4662f96f698f3e66a3feeee50e878f07d06d9f4d

    SHA256

    88dfb42a7d71f658e6b19505d81f445d7fbf3eeaf337fc700fd8ea5c24ed16f5

    SHA512

    8f4e1931ad548f7fcf49df21d63dd8a331970bd81c8d97349fafb57c8df266262284f6dd31cb05c996a7cd572530b504fdc7186275462c3b65f5f452eddf9f87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c35274c049bfc552782b94308e0d5d0e

    SHA1

    80eda58039191c8dab431de7a00c20ec1484cda5

    SHA256

    2b77839cc3a11c1d86fb56aedaafa7bd06e979275825662cf8b6aba2225141b4

    SHA512

    ca7fc5739bcfd3b9237e853d775e5b850fef4ce8c097f0fd85c7b887f6b2f48c6de257c3a639986909d8f2741eea783bbba8d59320f051884ed0fe9bce1e02ec

  • C:\Users\Admin\AppData\Local\Temp\Cab512.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar583.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1932-5-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1932-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1932-6-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1932-8-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1984-2-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2532-4-0x0000000000060000-0x000000000011E000-memory.dmp

    Filesize

    760KB