Analysis

  • max time kernel
    69s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 02:42

General

  • Target

    e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe

  • Size

    749KB

  • MD5

    e82c1e8ddc2992e0757b84511604c6ee

  • SHA1

    5845a030c4acb19f6e14e8dd38176cbddce9a45a

  • SHA256

    f38dc6c1274884084951e26f6a8e407d3ba1d8d08c71487d0cdb6c8e6ef60d6d

  • SHA512

    9271863ae173c4231fd05b1eacc359a8eb92dbc5bd155f33c5ec383722da8d0b604ae0c13cbfe067efbed261aa28b5afe5e85326e5ce55bda2d90ffb8cd4200c

  • SSDEEP

    12288:LkH96oZqhQ1FNA430e9YFgb1m7S4b9Gb17KORGpPATUhK:LkdRL3NAw1qaaSCkglPATUs

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e82c1e8ddc2992e0757b84511604c6ee_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cc3f558b1bb63e17dee1341e532d140

    SHA1

    9d5f44f4ed2e0160c34181bcd69e8891db8d497f

    SHA256

    12fdeee6f3713d75c03f5b3e78e61fda039be380c82a336b174ed0b26af21345

    SHA512

    5cd43bb03d90c40d227767bdc466066122ee39746d95ad033ea49d83b9bf2ecd63b91860db179aa39733dca6a886363dcacc4c9e8ec3552135362e15ac2ea620

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a417b23bbac51f8047f42423f46fb2e1

    SHA1

    e9ce5e27761b9e6af372b7d3a28786cb617114c4

    SHA256

    a247a1ce6c517850db1579b08df72a8055774297d9dc96bcbe6de0e0bd686b34

    SHA512

    089e49c07631b6874643bc3650686f9d1ec557cc666119b2c4b4742435bd74389780333640f117f718c08507b6d408e0b9de6042925332100940f6217136fb5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c99155d3479e2a04a692521d18cd92d

    SHA1

    453cbb978531442761b4bfdd98b9d6ddb42de380

    SHA256

    4d5c3277f3740357dafeb88d5814379a8fd81f3f01361fa964db9e5047f322b6

    SHA512

    7af70a88851b01e2c2a0c1b30409d90ec9502f97825b3d097e7ba1767a0c6bd8543afa12dede0dbe8e11e0751e0f3e39a5fb70c0c2ea15fbaee073352c2b0a1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7e0067fa6123c92501bbc9d0cb168a9

    SHA1

    60b4ec775cc5b98ee06c767aa71de1b531eddea5

    SHA256

    3031a599376ad70970825f5a6f3a6f188c593b33341436189a1fdb9fa5872994

    SHA512

    d49a5f00412203279a7cf4129eec0638636d8eac32bfbc42025769860e415846b68d975ae9911d472e6d4c286c8cbb855f542cbc879a2063a58ae91d9066237d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8a7936265c927956c2538dcfd0f70b2

    SHA1

    b0153b9853644265e155b0d628aeb86606d40397

    SHA256

    4854b5deba49587fe0c02afca49262c18957745331c968153909ecbf879426b5

    SHA512

    87a5665503107e229c5b8732198901fe31e8f3dfd4a8339f7e9a4e49534e184670a354088183f05fdcdd0cfaafb1460bce0245c84b230cb1174533a212438d31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c109f91d0d1e511d9ce7fd5fb26fdd5

    SHA1

    7ff362c5415b5c62c01ad4569f496e7cee8415c3

    SHA256

    53a8c3d3b1300cd98deb878408daec9b661464ac313ef4786a8085f18e23737a

    SHA512

    23f4ee7e1fb1ee1c6624e5ca569f0a7a91257b88766fd7a01075845d9dced04004e66720a6f1e59b7eb6ddf661ae9dd5c0758835c235acfb0a4e30280e87c0b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f0636dc0e4b9fa1e44eb882a1024df6

    SHA1

    f0703b80b35b0dd36658555d9e38e3308cf17e50

    SHA256

    53b444801569b1384e3af036cd9483535c96bba83c3dd6651c2985105efb3ed8

    SHA512

    0b2d7d24af1d944a11537d2652aa40fbd7462b5ca0243fea2bd0e7bf9aa6bc724b6503bf2df699492fbdb14147c742e6728f59e63be87163eaf674786db822b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08df79d6630682032dc924b579366125

    SHA1

    9c88fcd021cc6b1b89641c12e292ef8758974144

    SHA256

    6886621e52546c5e9dff2f114af5df91941b5bb08656686342eca38d36c8f805

    SHA512

    29bd46aee654dcfb24adb3be3635d35ef424cd031663980f434555bfadfa7d6cca729e058e9a602f81a189cdc031177afddbd9461939cbb3243a10c4cb2e869e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61c842c5e04eae214388a41e1e8cbc63

    SHA1

    89dbbcfa51358e595ee850e158d1ca75de9db9f9

    SHA256

    24161ccc963ba9461fe4127fa9792fc0b8ff14a4362c7e333d081b79d5c39d2e

    SHA512

    21b91dd48d9b829250ee9fce3e9479df05123f447dfdeab61f0341598df8711f83f3a48f07d9efb53ee857f4b46f84ea0c74d82ec78b5fb3182d6a885ede61ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d5f234bd70b04cb8601433df276fa34

    SHA1

    217b96f4843dbed7f659cbb1a0a42bd0789f4e7e

    SHA256

    ee70518ee7ae172d1273d3370d518a8346d636ab5edce551bac5fd30c94f33ee

    SHA512

    2efa1241bce26ed95f2e548395281c46012a410bdef56546f757128ba929a8503e4345d2a835f712af78caf8ba01390ec819e5cc431d581044b58400c67f3d3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6395195d11e35f2deea738c5ebcc436d

    SHA1

    df1dbf3d34861d01788b3e5ba956259fc9ffddca

    SHA256

    156752e81e802e662bca094ffa5592a52d9e0b88779476473bb337942bc06003

    SHA512

    1088a73751379e6a5fc4004785525bd7eb02b996d1fe73999e466c86856dac3a12de518a63eb769a13a29b37f25119c0b66c9a3534b7becab4739099e869cb40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8922a9de222388fd33056e3846a744d4

    SHA1

    761dbc313252759740dec2a9214294522b955f15

    SHA256

    06dac6d5dfec3f6da465ef3c18a5efb49426cbe5dc6c8be301aec333f273c0f2

    SHA512

    de84e5de1e8f88b10268872218cad02beb810ca6aa766307a7879542abf4ee8b0fbc7a7531823692d5c9cf440819420e3769e7bc7691ba0029306d4f477a07a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f100622f3053ebb5db7930ba922d6404

    SHA1

    f164b39933becfbc34a1e0346a87aeb461cadebd

    SHA256

    42c0bdc6fc719db24ca3b77ec0f6426b0fd60d6e668b28403b4e5ee24a1a3a57

    SHA512

    5c1831c0d890574a700f28e1fb3d75f97fbbcc7b6cdc29ee64f1092d833cc1f417c76a9b6faddb2c42a9bd6d425706745c5010ea49bc9244dbbd5a8b86c145c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb2170fb578b8ff6c39394b3662b3379

    SHA1

    79fbf5dab0aaa614f60a8d43978c7caac265b064

    SHA256

    72c5403e1d245126d3b417126f3e2f8a08f7f7301585a6a64ba2a410575df3ac

    SHA512

    5078e3ea8c3bcf07bedb7cf066d1889354d577745a7ff6b6e960fbb1f6c53a88015e2e96632fc3a3afee622a29e089f60869b65f7b58d524a71d69ab27a9e748

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93164e19f551bf66b931424407996cd5

    SHA1

    31c8b526e8d37178d5eacb7806c577edbb539b21

    SHA256

    83a87585a5d3e1ccb07c703f4bc1ed04f95eddad22dd0b0184466176204ff737

    SHA512

    cbc456d379cc5a335acee587e0d2db5f131e8a26f35218a18c355c5ad7b6b0f1e701484b894f6f89d03aa101a130aaa370e4655849123ccc6da56b3825c82b8a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd6c295bf9d95a48fb6fe845b264fc77

    SHA1

    055e5027d7fcc021f93809f074e427ccf2543f6a

    SHA256

    6090227fe8231412f5365cf3190fa074aa45073e827d05417279b03d3ba14067

    SHA512

    505107af578b365ffcc3db21c9117da4a5aff2bc8d423329ea538c8d28d2b80886023fd03cacf814fd88d28f92409c752a3480f8da56488968efda95707cf013

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7aeadc7aebecbdc9d11d2fb42f7079c

    SHA1

    28290f5e488ceadb74474720aa1b62331ddd3f62

    SHA256

    100d7cad00432ad930bfc680f3068d4b18b0865b540581207b5485f92769dc80

    SHA512

    74d82b51f772b8529a0f4a0bff35a7e6dfedf0231aa9e26980029a8ecc0b575f7e9db238a03e04f777493d23d0c88130276346a8e2c5feaa44d86727264c4a09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    175f715ebe85c86862acf1a59aefa044

    SHA1

    2051e07ced62bd4f9800aacf2e72fbd3830c031c

    SHA256

    33143bc0c8640027e39a843a530dd91e70ce4177f70c2b9a99723d1eadf74fde

    SHA512

    fa759b686bf4149a2511d2053ddf36c1d0d2743f25fc90c029c7a79b356eae7ddc972881bdec3cad613c400947aaf692b2c920a372a0ffc6d794f382b45abfa3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    798fdc66d711936643b0e7547ebc57a5

    SHA1

    4266599cf65c5790432259dc5f8a1f244fd8ce94

    SHA256

    e20824b4eb17ea368347bc5bc1208b90cfe70b5ed2d10b780d8ab2bca2edbae3

    SHA512

    9b617dd8d95c88c1eba811ed8c03f2e74e4131bae4f5f8de065babb3952791ddc70473a4ce2ff969d450ff15cf6a3861718a1c80ba0d393e308c60b2690cf853

  • C:\Users\Admin\AppData\Local\Temp\CabBD2B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBDCA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2436-0-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2436-3-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2888-2-0x0000000000190000-0x0000000000254000-memory.dmp

    Filesize

    784KB