Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 02:42
Behavioral task
behavioral1
Sample
e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe
-
Size
749KB
-
MD5
e82c1e8ddc2992e0757b84511604c6ee
-
SHA1
5845a030c4acb19f6e14e8dd38176cbddce9a45a
-
SHA256
f38dc6c1274884084951e26f6a8e407d3ba1d8d08c71487d0cdb6c8e6ef60d6d
-
SHA512
9271863ae173c4231fd05b1eacc359a8eb92dbc5bd155f33c5ec383722da8d0b604ae0c13cbfe067efbed261aa28b5afe5e85326e5ce55bda2d90ffb8cd4200c
-
SSDEEP
12288:LkH96oZqhQ1FNA430e9YFgb1m7S4b9Gb17KORGpPATUhK:LkdRL3NAw1qaaSCkglPATUs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2436-3-0x0000000000400000-0x00000000004C4000-memory.dmp modiloader_stage2 behavioral1/memory/2888-2-0x0000000000190000-0x0000000000254000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2436 set thread context of 2888 2436 e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe 29 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC2F6051-7567-11EF-9B59-D60C98DC526F} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432789229" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2888 2436 e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe 29 PID 2436 wrote to memory of 2888 2436 e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe 29 PID 2436 wrote to memory of 2888 2436 e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe 29 PID 2436 wrote to memory of 2888 2436 e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe 29 PID 2436 wrote to memory of 2888 2436 e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe 29 PID 2888 wrote to memory of 2232 2888 IEXPLORE.EXE 30 PID 2888 wrote to memory of 2232 2888 IEXPLORE.EXE 30 PID 2888 wrote to memory of 2232 2888 IEXPLORE.EXE 30 PID 2888 wrote to memory of 2232 2888 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc3f558b1bb63e17dee1341e532d140
SHA19d5f44f4ed2e0160c34181bcd69e8891db8d497f
SHA25612fdeee6f3713d75c03f5b3e78e61fda039be380c82a336b174ed0b26af21345
SHA5125cd43bb03d90c40d227767bdc466066122ee39746d95ad033ea49d83b9bf2ecd63b91860db179aa39733dca6a886363dcacc4c9e8ec3552135362e15ac2ea620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a417b23bbac51f8047f42423f46fb2e1
SHA1e9ce5e27761b9e6af372b7d3a28786cb617114c4
SHA256a247a1ce6c517850db1579b08df72a8055774297d9dc96bcbe6de0e0bd686b34
SHA512089e49c07631b6874643bc3650686f9d1ec557cc666119b2c4b4742435bd74389780333640f117f718c08507b6d408e0b9de6042925332100940f6217136fb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c99155d3479e2a04a692521d18cd92d
SHA1453cbb978531442761b4bfdd98b9d6ddb42de380
SHA2564d5c3277f3740357dafeb88d5814379a8fd81f3f01361fa964db9e5047f322b6
SHA5127af70a88851b01e2c2a0c1b30409d90ec9502f97825b3d097e7ba1767a0c6bd8543afa12dede0dbe8e11e0751e0f3e39a5fb70c0c2ea15fbaee073352c2b0a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e0067fa6123c92501bbc9d0cb168a9
SHA160b4ec775cc5b98ee06c767aa71de1b531eddea5
SHA2563031a599376ad70970825f5a6f3a6f188c593b33341436189a1fdb9fa5872994
SHA512d49a5f00412203279a7cf4129eec0638636d8eac32bfbc42025769860e415846b68d975ae9911d472e6d4c286c8cbb855f542cbc879a2063a58ae91d9066237d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a7936265c927956c2538dcfd0f70b2
SHA1b0153b9853644265e155b0d628aeb86606d40397
SHA2564854b5deba49587fe0c02afca49262c18957745331c968153909ecbf879426b5
SHA51287a5665503107e229c5b8732198901fe31e8f3dfd4a8339f7e9a4e49534e184670a354088183f05fdcdd0cfaafb1460bce0245c84b230cb1174533a212438d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c109f91d0d1e511d9ce7fd5fb26fdd5
SHA17ff362c5415b5c62c01ad4569f496e7cee8415c3
SHA25653a8c3d3b1300cd98deb878408daec9b661464ac313ef4786a8085f18e23737a
SHA51223f4ee7e1fb1ee1c6624e5ca569f0a7a91257b88766fd7a01075845d9dced04004e66720a6f1e59b7eb6ddf661ae9dd5c0758835c235acfb0a4e30280e87c0b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0636dc0e4b9fa1e44eb882a1024df6
SHA1f0703b80b35b0dd36658555d9e38e3308cf17e50
SHA25653b444801569b1384e3af036cd9483535c96bba83c3dd6651c2985105efb3ed8
SHA5120b2d7d24af1d944a11537d2652aa40fbd7462b5ca0243fea2bd0e7bf9aa6bc724b6503bf2df699492fbdb14147c742e6728f59e63be87163eaf674786db822b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508df79d6630682032dc924b579366125
SHA19c88fcd021cc6b1b89641c12e292ef8758974144
SHA2566886621e52546c5e9dff2f114af5df91941b5bb08656686342eca38d36c8f805
SHA51229bd46aee654dcfb24adb3be3635d35ef424cd031663980f434555bfadfa7d6cca729e058e9a602f81a189cdc031177afddbd9461939cbb3243a10c4cb2e869e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c842c5e04eae214388a41e1e8cbc63
SHA189dbbcfa51358e595ee850e158d1ca75de9db9f9
SHA25624161ccc963ba9461fe4127fa9792fc0b8ff14a4362c7e333d081b79d5c39d2e
SHA51221b91dd48d9b829250ee9fce3e9479df05123f447dfdeab61f0341598df8711f83f3a48f07d9efb53ee857f4b46f84ea0c74d82ec78b5fb3182d6a885ede61ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5f234bd70b04cb8601433df276fa34
SHA1217b96f4843dbed7f659cbb1a0a42bd0789f4e7e
SHA256ee70518ee7ae172d1273d3370d518a8346d636ab5edce551bac5fd30c94f33ee
SHA5122efa1241bce26ed95f2e548395281c46012a410bdef56546f757128ba929a8503e4345d2a835f712af78caf8ba01390ec819e5cc431d581044b58400c67f3d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56395195d11e35f2deea738c5ebcc436d
SHA1df1dbf3d34861d01788b3e5ba956259fc9ffddca
SHA256156752e81e802e662bca094ffa5592a52d9e0b88779476473bb337942bc06003
SHA5121088a73751379e6a5fc4004785525bd7eb02b996d1fe73999e466c86856dac3a12de518a63eb769a13a29b37f25119c0b66c9a3534b7becab4739099e869cb40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58922a9de222388fd33056e3846a744d4
SHA1761dbc313252759740dec2a9214294522b955f15
SHA25606dac6d5dfec3f6da465ef3c18a5efb49426cbe5dc6c8be301aec333f273c0f2
SHA512de84e5de1e8f88b10268872218cad02beb810ca6aa766307a7879542abf4ee8b0fbc7a7531823692d5c9cf440819420e3769e7bc7691ba0029306d4f477a07a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f100622f3053ebb5db7930ba922d6404
SHA1f164b39933becfbc34a1e0346a87aeb461cadebd
SHA25642c0bdc6fc719db24ca3b77ec0f6426b0fd60d6e668b28403b4e5ee24a1a3a57
SHA5125c1831c0d890574a700f28e1fb3d75f97fbbcc7b6cdc29ee64f1092d833cc1f417c76a9b6faddb2c42a9bd6d425706745c5010ea49bc9244dbbd5a8b86c145c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2170fb578b8ff6c39394b3662b3379
SHA179fbf5dab0aaa614f60a8d43978c7caac265b064
SHA25672c5403e1d245126d3b417126f3e2f8a08f7f7301585a6a64ba2a410575df3ac
SHA5125078e3ea8c3bcf07bedb7cf066d1889354d577745a7ff6b6e960fbb1f6c53a88015e2e96632fc3a3afee622a29e089f60869b65f7b58d524a71d69ab27a9e748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593164e19f551bf66b931424407996cd5
SHA131c8b526e8d37178d5eacb7806c577edbb539b21
SHA25683a87585a5d3e1ccb07c703f4bc1ed04f95eddad22dd0b0184466176204ff737
SHA512cbc456d379cc5a335acee587e0d2db5f131e8a26f35218a18c355c5ad7b6b0f1e701484b894f6f89d03aa101a130aaa370e4655849123ccc6da56b3825c82b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6c295bf9d95a48fb6fe845b264fc77
SHA1055e5027d7fcc021f93809f074e427ccf2543f6a
SHA2566090227fe8231412f5365cf3190fa074aa45073e827d05417279b03d3ba14067
SHA512505107af578b365ffcc3db21c9117da4a5aff2bc8d423329ea538c8d28d2b80886023fd03cacf814fd88d28f92409c752a3480f8da56488968efda95707cf013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7aeadc7aebecbdc9d11d2fb42f7079c
SHA128290f5e488ceadb74474720aa1b62331ddd3f62
SHA256100d7cad00432ad930bfc680f3068d4b18b0865b540581207b5485f92769dc80
SHA51274d82b51f772b8529a0f4a0bff35a7e6dfedf0231aa9e26980029a8ecc0b575f7e9db238a03e04f777493d23d0c88130276346a8e2c5feaa44d86727264c4a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175f715ebe85c86862acf1a59aefa044
SHA12051e07ced62bd4f9800aacf2e72fbd3830c031c
SHA25633143bc0c8640027e39a843a530dd91e70ce4177f70c2b9a99723d1eadf74fde
SHA512fa759b686bf4149a2511d2053ddf36c1d0d2743f25fc90c029c7a79b356eae7ddc972881bdec3cad613c400947aaf692b2c920a372a0ffc6d794f382b45abfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798fdc66d711936643b0e7547ebc57a5
SHA14266599cf65c5790432259dc5f8a1f244fd8ce94
SHA256e20824b4eb17ea368347bc5bc1208b90cfe70b5ed2d10b780d8ab2bca2edbae3
SHA5129b617dd8d95c88c1eba811ed8c03f2e74e4131bae4f5f8de065babb3952791ddc70473a4ce2ff969d450ff15cf6a3861718a1c80ba0d393e308c60b2690cf853
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b