Analysis

  • max time kernel
    121s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 22:34

General

  • Target

    ea18698e458acba39dd2bd5d72ed5c38_JaffaCakes118.exe

  • Size

    293KB

  • MD5

    ea18698e458acba39dd2bd5d72ed5c38

  • SHA1

    3ab55981acacbea82f24219f10e1ba790d996e9e

  • SHA256

    54561548d54c2712eae3937f3cb3a71374bd29269a0050b4d4c7cebd417bfaa9

  • SHA512

    5bdafbcae494963cd8869ba288cffed1d20200c7cfa125b3639923c24f44f9e21e4463ac771e583368761105f268a7c715faa9ba1e144b09f8c21ad1bca42164

  • SSDEEP

    6144:jIUklpdvUi1WJbmuOYZaLgHw2lo9zpSiV1WOn7PEs4guLuYRp0d:jIUkf9xWJbFbZaLgQ2C9zpSfIbN4qM2d

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 8 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea18698e458acba39dd2bd5d72ed5c38_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea18698e458acba39dd2bd5d72ed5c38_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\ea18698e458acba39dd2bd5d72ed5c38_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ea18698e458acba39dd2bd5d72ed5c38_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\AOAWR0.EXE
        "C:\AOAWR0.EXE"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\cmd.bat
          C:\Windows\cmd.bat
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\program files\internet explorer\IEXPLORE.EXE
            "C:\program files\internet explorer\IEXPLORE.EXE"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2532
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\SgotoDel.bat
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2372
      • C:\Windows\SysWOW64\DHDOV1.EXE
        "C:\Windows\system32\DHDOV1.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\259425123.bat
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2232
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe" /v debugger /t REG_SZ /d C:\windows\system32\ctfmon.exe /f
            5⤵
            • Event Triggered Execution: Image File Execution Options Injection
            • System Location Discovery: System Language Discovery
            PID:2852
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safeboxTray.exe" /v debugger /t REG_SZ /d C:\windows\system32\ctfmon.exe /f
            5⤵
            • Event Triggered Execution: Image File Execution Options Injection
            • System Location Discovery: System Language Discovery
            PID:2968
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe" /v debugger /t REG_SZ /d C:\windows\system32\ctfmon.exe /f
            5⤵
            • Event Triggered Execution: Image File Execution Options Injection
            • System Location Discovery: System Language Discovery
            PID:2340
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe" /v debugger /t REG_SZ /d C:\windows\system32\ctfmon.exe /f
            5⤵
            • Event Triggered Execution: Image File Execution Options Injection
            • System Location Discovery: System Language Discovery
            PID:3068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\Users\Admin\AppData\Local\Temp\ea18698e458acba39dd2bd5d72ed5c38_JaffaCakes118.exe
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AOAWR0.EXE

    Filesize

    287KB

    MD5

    1b451ba997fefd59151dcc93eae4d847

    SHA1

    9c0e8da1a4209c8f11240374fd9071332c9930d1

    SHA256

    0516959d4fff534c129567fe04d9f937d211df181c9c239fc2951dc272a7a909

    SHA512

    6f2f6ee2c7a45e2cac20e29d19d2773fcc1301c9ad67af7cac9114861a77bd423d52dd7b65f6ea99cae0defbbfcb338425e8e8252b9e4ad1fda54059d973637f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80baad39e8584315d70a3cc830173b52

    SHA1

    1d53c3548c679522b533f70cbcfdb7ac5c97939e

    SHA256

    286e216de75dc2cd932a8a2f1300b1faa13730ffe0c9c8fdd0c0ef997dab981e

    SHA512

    a854092a5adab05cc95b7b97cc6dfcd38ced665794cbcd030d98c2d885d180b4565a548b180550961b90508c9323af3335cc34e614955e8b07153eaa92dba9f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9ca4a6577ea6ef881740b88776e4aa0

    SHA1

    4358be363eeed116369f4a0700676298ac4e40d7

    SHA256

    0252a33caf5fbd8bffafa6f83c1f5dce4ec0be7c483e14697418ae8cc734497d

    SHA512

    0ef278cb57619b315725be163c6b0138a2fc31dc9760b3c5aeb91073d6760e624f99c32fadadb85fc9f251225317007d618c63a6a79d482e35762c5ec153a265

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f5e8689e771c686ac31490fc895da4c

    SHA1

    78351f15509dd12e5ef5af86d70ae222598851ef

    SHA256

    e0189e6b4a63f10bd4ed4609d9186855067e4cc69711a131d1540c7a982499bd

    SHA512

    0ba195b975ffa9550d11cf9de6e5a650bb5c64a9098a3e4161a627d52206e567b15375f85100e52b05cb9ee3528baedd739cb7bbb0faecf20113a4f087c95f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f7254ab5f316d8a54759c38ad7c7dd5

    SHA1

    03fdd99a6dc6031e96a08c29d97a2723e49029fb

    SHA256

    f47f661a7136f80d124f3f35c51d9c6c3d696bbcd19d11e41a32f435a434987d

    SHA512

    0e8001111f5d97669be1d111d31834981415b1264f47ae6b7cd8f13484639bddf218b8016e69b22d67e811f44c6ebbaac5ce2a53eb0169a6b35a26cbb293acef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c3ba3180daeff7657e7495d79a2d1af

    SHA1

    b5e6c20897230af4cfb86e8254afe6e702d00c3a

    SHA256

    b532a955321fb24f2cf19b74c08c61857be0b9956e9a9b28e7c8ccac98556b56

    SHA512

    d136b7047de2e2b6ea238f9e8f5d2c72aec2e13d3efa992d99584c0983bc0edb3e22e09fd651881a7162c72bfe485749092435a8c5bbf7b5394897e7edd3e9ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98f0e1f4ea2546f256652cef132e640d

    SHA1

    c87e197e9285848d0f61425ddd5d377c1cbb5a17

    SHA256

    7338ca3fd16b397beeca39af62d63665ae1b13e008bf874abae6a8c9254b77df

    SHA512

    304a2b8d403c314ce02f04cdec0b31d414e1a9f70c1a9da9cc6c6d6ca31e94d02812aa8d8605a52593c23687267a852e75774263a09fb7260ac5667c44dfb629

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0314b0d11ca4dd849a2faf5d6d1587d3

    SHA1

    6e37e765e600bdaab4ef22d3c348f0426a075393

    SHA256

    eb9b8ad792294902acc1efafacfbb0cba11eafa72ebbe023adbad5afda052a2b

    SHA512

    2dc32716149ecb8937da4c71dcb128ea72997e0091b8f2f77e62a9653190cc597535f7cabef39fea90a4ceb70a6988742d2035658db12aecc8094c531b5c1280

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    639d6b856fb6d05c56083ec966672a81

    SHA1

    fd35574844dfc6db7c6bc64816689c8776f1a41f

    SHA256

    19d7b3f2c2468677525d238e186bd8e19b08076f9a6714e305ee9ecd43fa333f

    SHA512

    3f423d3c41e28aa1863b0301ae705c05def35643fb86b2ef4af1bc645c074ee91792641f3633c697a645f535321a0a9c2d7d6932f86b4d0e1a88ad8dae53ace9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d51162b92451de1e7849715ac30ccd29

    SHA1

    cac3cd16cccac108623c95497854cc63e2a01d36

    SHA256

    3c95b2b9d1c883a3652777a989f57a0ca551e36d90ffd3920338bafb2f37b177

    SHA512

    0bbabbd1623e7cec59282c2aa5fad056696a1f7391a463efb7eb8cd6c5757a6df90fe56cab5dfdcb1a5e3b6e4d72ad9abd38a309045fb79c7a9a84d9f1391c05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1ac1ae986fa089d99d2fec12b23a6ed

    SHA1

    a7f17da727db9ce3d102ca86d53e92f5434651b7

    SHA256

    40d97863cecc6cdcbe13345ce7409c8301bd5ed2ddc91a2a6b7ec12c3931d3ae

    SHA512

    35d004fa8c5da84569c4661e4d15e4a8ad94d35c7def1ad37e909521fae481cc9680dd484d9eafd3cb2094b21a2165dff65b0379155e432a775fea247e418911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdc805ee7af25d833e97a4cc218b7c98

    SHA1

    ab35602fb62e120691d407bdcc53fce16613f2d4

    SHA256

    88f9c41ad8170fc598529cbe1e39cdfc5874cae624fcd3d2232b6c44d5e78167

    SHA512

    e00ae5625fe04fff89633fce1ce2106f44ebf091cfe0c85f0fbadb315cea7fb8dd8663d67899efbd11dbf9260d4d7a6011cd4d1bd10335680d2ef39d6a210b33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    456de36dbca0d03d07b5cac16cd15934

    SHA1

    35da13799c2c985d373ef90342067143565cff7b

    SHA256

    f493b9d8954c167b1c2529979ef1e0f43647c4f135073ffc7b721de6e7d559e3

    SHA512

    efda0cb5c655a514bcf85b710326c5df7703d3895c1ebdbc45630cd7e56441fb2cebd6ca59b85d85bd3270618870bcc7ba05c0c56ab12a93ba9995e8726576b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfb4412afc5aa7ac6a5ee369198fd21e

    SHA1

    88ebcdb724ffcf50cd8a783bfb2ebbc7615d152f

    SHA256

    b8d5ae5b9f107461f6615aaa3fd57c1ce9962a559b6fcfefc2b92557e0d6a254

    SHA512

    bce21ebcc03cd638d6d4c928eed2e284cd29b44921eb601d3e1d1d6d2d75bd50bed9a4f579ef419e295349f2250358f9d840836ef24f3baafcd28bd0d40be471

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5b778cdb7bdb6ec3f1d5f3080cacf5b

    SHA1

    23ff8e2196033468ed01f95d33f2cc792c54b7e2

    SHA256

    2451942968952f939f0e0faad4631840741d31f6f221ab6914a9cfa080faf325

    SHA512

    8ced11f178dd2d77a0f7bbd62954b862e63b8c6fa46fa16737158649a2eec438c447a68a5ba32aec5f170d93d642dd776d0b19a3d4b94f9c2ce1aea977cc2570

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3c2b57e0da10878817a73002df25a6e

    SHA1

    95f0b3cd1a91378503bbd03dba208b4f3385928c

    SHA256

    0b3505b41edb396b83510a69bd3229739b9016cfe84da3af858e5a1ebb3d94a8

    SHA512

    9bb0914de5e7ffba78335185c843b8aaae3e5929a855b9cd139f83392fb366a9f2d17721d61e9e3521a0496ae2c5632a123a3c6ca3a1951f6c5ac7b7c8e53122

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f38619b93e3703231bdc159e879f422

    SHA1

    25ac68b403424d0ba19e0c1bf9ee4cbf3ce19b1b

    SHA256

    d980396bd4e5bd8a74cf18ea5d491e61f905b37a314f701fb7b609621bf9ad47

    SHA512

    fc6e8d8ec5f50012a0c83100a2babad9ecca9e49d2adde7e5cb7457f89d81362dede1544b055bd74171e7b7a0714cd3ac491d22cedaa57cc85831f5614f01dce

  • C:\Users\Admin\AppData\Local\Temp\259425123.bat

    Filesize

    705B

    MD5

    7e0253f0bd4bb96dae402b738a3bbb73

    SHA1

    70a91f7bd7b56985847fe65a89c603f424e2958a

    SHA256

    174270c1aeb9ea7800d9b4633e269dc0f493b54f7ea53b0fb254b710dd12634c

    SHA512

    e2b03043a00c64da369de2150eda98597cadcf345b1b53cb71b00ab3e9e7ad3d627244ff150f2376bd39b590fb08987d08335217ec1a7462cc6cac5eb6020632

  • C:\Users\Admin\AppData\Local\Temp\CabA8DF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA98E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SgotoDel.bat

    Filesize

    70B

    MD5

    4fe2bd3da1a36febe73d51a6fe1540c7

    SHA1

    a048cfc160b3ab27ac1646b9e89be324850f112f

    SHA256

    1fdef4ca952e893d74b41d52ed00774ce956c45e7aabc2a8b9cfe6397eadc314

    SHA512

    3d03b316fcfe201acf59a8bc81b52c987e79916f4fa125dc759fa6f2ce56a35c1f4c6c66e35bad9f0bfa279782439562165eb45ba74c6bcb17771ab72448fec8

  • \Windows\SysWOW64\DHDOV1.EXE

    Filesize

    5KB

    MD5

    fb2527c07abdbe7f75cf2159bec981d6

    SHA1

    41962ff04c0055f3e5b3b91a13765faa8efc36d0

    SHA256

    373b19f8b33a8a5b2f22f01acfc7461ce52835ebcf8982a0376cc5545efb337b

    SHA512

    27c3e72b9041a4f9eaf2984ae7fb95d2d8d1a1b896ee0bfc6fe7d748fc22974550b3984cbe3a777c408fcbec2fad87b9ac869f14258595787391bf661bee1266

  • memory/2028-54-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/2028-40-0x0000000003200000-0x0000000003348000-memory.dmp

    Filesize

    1.3MB

  • memory/2028-42-0x0000000003200000-0x0000000003348000-memory.dmp

    Filesize

    1.3MB

  • memory/2028-14-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/2292-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2292-25-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2292-0-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2628-45-0x00000000001D0000-0x0000000000318000-memory.dmp

    Filesize

    1.3MB

  • memory/2692-53-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/2692-43-0x0000000000400000-0x0000000000548000-memory.dmp

    Filesize

    1.3MB

  • memory/2904-12-0x00000000026E0000-0x0000000002828000-memory.dmp

    Filesize

    1.3MB

  • memory/2904-13-0x00000000026E0000-0x0000000002828000-memory.dmp

    Filesize

    1.3MB

  • memory/2904-23-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB

  • memory/2904-3-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2904-2-0x0000000000400000-0x000000000049E000-memory.dmp

    Filesize

    632KB