Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 05:23

General

  • Target

    e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe

  • Size

    761KB

  • MD5

    e8695d72027ca968f326a1fca36aa5cd

  • SHA1

    739413f4dbfe307f5dd639fba971eb3ff17cf933

  • SHA256

    6ed8c400fd7b148b93a07d35e03914475d6addcd6e728e3158cd98dbf1a329e5

  • SHA512

    19ba82a6c5c68db1a0055c4a367ef7eb7b214a3e336264a4d687008360fb439b0ccf2a31f29c4d357c86025da02421a224f243fa020a0213f89bed781198e1db

  • SSDEEP

    12288:ePXgBZthC7ipJ795LrWxONWpkfebpwi1ckyk120N6whBKvZzmTNOzIIXi:ePQBrQ695Lyx3qIGw2rNvZzmTk8Iy

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8695d72027ca968f326a1fca36aa5cd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\OINFOP12.EXE
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\OINFOP12.EXE"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\SVCHOST.EXE
        "C:\Windows\system32\SVCHOST.EXE"
        3⤵
          PID:2760
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c8d7a1f4a0998339a06586110baf1715

      SHA1

      3b9b3e9fc8617d9ecb426e43df5f8bca25a32cdb

      SHA256

      11f16664dde56c5e25737413148dd0a34034ab38219027297971657e8999b6e9

      SHA512

      0af64180a846287dd05e1d950f240109caaa13175f86ab7b7bc935f9a4829bd164483989cd216b84040a9c6e8fae2f0d42250e49aeb5b2beb51dab0101d9499b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      887fff68151706c1b7937a327297415b

      SHA1

      eabee34eef733dfd2fe96419cc4b50243cf64686

      SHA256

      40f09263fed75372b1428d3ec2582f586b57c30356bad451bad6c53499d87a27

      SHA512

      74c47e3e43e04cad624aac08209b7e2acd2786cd1443d09bae69717e7d8fc5de458162175aa91744ccda0152a7b14ca310a184f8e30bb41c12e248cc6b84dbe7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0e516c6ae53df07149bcc2c23a444e24

      SHA1

      0638266206173d3e01bab196515b81a3a93b2a39

      SHA256

      65b778375e251c2d318770d21fae6f7c8c37ba4b6c9296a1179d39a06a04d84e

      SHA512

      8d6838c3c4eaae185b95e5c03546856dd561d10190c8592972bea7839f95d8039a7b551f30d5ffdd562ee10e470834d8bbaca34c5320d3a0cf616f21f2629e40

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a13dda5dc7639209b448648be1a75ec2

      SHA1

      67f052fddb3f8924f705980d55dc7bebbfa20291

      SHA256

      73c0e76793de945a1a4376c5de56a4f9031fed869cfc92fd344707ba83444a9c

      SHA512

      0935a0c3fc8bba1d3659139eee249d4c987bfa5147c03a607350e775e0cc12354767e4363b8824158dbbbaa8c785130ac142e3c75dd2c18628d4b8b019f38871

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      01f8e647c3b9259f99dd871b1ad2f03b

      SHA1

      81176786bc8c28cbe2e21b285f3ec3ff3ddb8dfa

      SHA256

      9a4674ec0e21fd83c6fc830050a95b43ac21bac4597dd7470813ae765263a5e0

      SHA512

      583cfb0cd445d0c1857203b9cf3861eee9d3638fc9b0758f45e7f322abaab4055989c9acf6d04b131dc36552a56acb3e1c2398f4dfaaa108ac0adc58678c13d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      90617f3084d55e764ea749ef3efca46e

      SHA1

      f036a7e860bde212f399c610e8886bc8760b09a8

      SHA256

      d534e086aff1e3088d8d809560a146c0bdcbe34cd937ed9da45ceca0d7b946ce

      SHA512

      4e4e0c8c6d7b672607aca478ea246655158d4d763bafe04879ebbc771265cb7a214047001d2c16bc02d8b6b953dba19aa2e2dfe7244f5227e774edf0ece3bb7d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      53fc19ee29b88c5e912817597a3d67ec

      SHA1

      618e8ec3acf6e430a71a71070a357e3277456e10

      SHA256

      0e2f79735e9e830862da29cda118990b2ed59e321b86cb937d877a5fba71e185

      SHA512

      386fc782d08be7b76ff3172eba228cdfd7887508d1c0473d0d9f01aed020c9cacd4f82a393ea4551a3f4458912e4a5fc2b0bb43fbf26406684e51bdb2ad96f4e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3793df796b5e270406d4a69d7fa2832a

      SHA1

      dcbfade3b44d9ce92fe427b6a6d15b366ad47b6d

      SHA256

      841c732aaeacee210f806c0868bb73c98d74e8f23b0c9340aff3b1501b24b224

      SHA512

      55979818924321c4e2b0270daab642fd2ba17f80255c7f29d51dd02e2227521885944f517d4969c552936ec70e4399643625c71d734a88c409a53fc4dded9852

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f2d072ee5c37ae54f7b7e2de94328401

      SHA1

      d99aee9821de89b25daa1c3d9ae51433de7cbf42

      SHA256

      6517d5ed8d21c3cd184ecf59888f844bc205f1adeb78e40beb25a15e33f6d576

      SHA512

      d97e33c1ed348d3b95aca5e183e8e25e1589c6284ec6d0b6bad67e744b913f403e705ebf56924fcf945f90f68bcc67a5ef995937aed88393e359cecb3117a853

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e2c0690c49aefe5a0bbc77f2fded67f3

      SHA1

      2f0a1b257195cff753b50970e44ca97dab2df241

      SHA256

      ef343a6bad9fd282c8e7af551e38e6d7dcb005bfa02b75b4dcea9972ea04abca

      SHA512

      2802a19311068daf54097b39e48d04c558a07b74f127c2e0166cbd13d70a886cd8ceee01782ec7adcad225677e6a0a2924d7080ca9dd9a0ba6b0a0bb80f143f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f509d284dad98f31d1f3e71de23f33b9

      SHA1

      2878946f554266d21110e8a55a00c2e6ed0d7ede

      SHA256

      d618f55e8f6c456e613a106d25afcdb59b8a56766a64ac2002e6ad3c3812a86c

      SHA512

      de499528d21533532c927d56660820659e48db3dc87d5bab356c85328b83273598c607d4f032ed413dd5dcef43171840ce97d3e4807480900ba9cf122e300687

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a2cad457489c7153312e60cdd33c52f5

      SHA1

      4d4217f9f1f9854eab7edc8a2d43fb50d2a69d13

      SHA256

      80c651b648ef6322303659f8c7f9c41f4ca74110fe970269d60fa43c628281c3

      SHA512

      05ac41e1f6287a2aa0fcb7d4f68b17f282ae6fc6dfed5b4de8e78829a42fdc99d525afa84f1f19bcf091e8ce1ea6351deb6bd36c7e4bb009f61dcb5259dab7c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9581d5878dac27d7e4551c88d558d3ec

      SHA1

      1772b53db8064abf5850a3fc2d8268b8a5ea85ee

      SHA256

      275f2035a4ecc3ef70540b9fb0f21a02bf5a7956c2887cac52cad76c2f64c0f4

      SHA512

      7b83756160226db3c84d26002ab71f211d32e6bd9d4d1713615aa2f2abcbe3260d6d4cb30a92d7e06855c4e7714f0817acf5457c4a6f273af8a9ba56d62788a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e9a64aa8541c2ac5c7091032e4a847ad

      SHA1

      3d5e29db7ae967c7b7928ce3338deb7993e5a37f

      SHA256

      4b413d70d0e2bf89279d5f40ab41656e0d4aa915bdafcbc42956e481af88f935

      SHA512

      fa70912d97111909134bd293859c569a5844b2c5daae5947c9afeb277e7c484dbc1513d367ba7847c27b714214f25cbcf7604bd83bf836d185acbc85ded0e53b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      68da26ecb58427f6a8853ea5e82290a1

      SHA1

      daa292a133b4894a33fd1ec5b49e2e9ea68bf5c0

      SHA256

      cd33163c728b7fd2ea388706cd1abffbfbf0c102f54d3406916a179126df1253

      SHA512

      85df36cf53a1d8570a8502cf9eef94cd59e4ce59c1b7a36becf7c038c2baf5895d811109764995ca30a1d7cc940ca3e57d22c444cf689244673cd8e74fea699b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2978b0154b7bb9b8c9da8d803133705f

      SHA1

      c838014babe807bafa6270203c75c028daa9e93d

      SHA256

      bfe714a3b34900a02035fdaaea94c09401c52366b31ad8d913d6de9ca5ad218d

      SHA512

      8e33252c4a4038d301afdb01983afc4c44ea8e798ab177c3ef2f7934cf548c8d216937668d51828ff757d3bf1e45cd609a5e7a1755e80a54cf894e2d17ee3398

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      05cd5abac128b7f2ae74bbdb258fa204

      SHA1

      94d6187cd434c49f2a3c65a035dadc684fa376cb

      SHA256

      4a9e8c3586b8ba7b15920e811740ef433695f37f6a1f32d048047ec73f2591e4

      SHA512

      fb105addf5687e9bd6964c7941759165fe93512733fa265b442b5cee786e53ecc553b11b97e3839dd981908980e7131ef959448c4b573c6de24f7265d2c1f75b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      27ce94de20e9d925ac4679b09043bf34

      SHA1

      144ab61f3493d149ccf1602ef65e5875d5c50fbb

      SHA256

      baf8d2207d31f9cad733797e63d4605af0017546eafa2ff4733d9be269ad6574

      SHA512

      a6fd86723bc33fff5b45e73f82fc343d125dd74e371f3a5bcad38b872004dab109fcc6df8982f984b6e5dbd397e94760725994afe024ed0c03a98cab27fc9147

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      69147ec42cf95920c56a72d6e43b7fa9

      SHA1

      19a6a317789ec5e098264a1dd7c02e313e94e001

      SHA256

      244d5f27beef67250db5680e613f03bbf4d6577db85d38c7b5255b18e785d231

      SHA512

      99d54e7b609370b3548e41bb5c3cca577a111f379755395dc31074f14e12fbfa7a5eeb9decee3e31cf460046f9273354978856301d4934b236dc42b5c86c91bc

    • C:\Users\Admin\AppData\Local\Temp\Cab73BC.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar742D.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • F:\OINFOP12.EXE

      Filesize

      761KB

      MD5

      e8695d72027ca968f326a1fca36aa5cd

      SHA1

      739413f4dbfe307f5dd639fba971eb3ff17cf933

      SHA256

      6ed8c400fd7b148b93a07d35e03914475d6addcd6e728e3158cd98dbf1a329e5

      SHA512

      19ba82a6c5c68db1a0055c4a367ef7eb7b214a3e336264a4d687008360fb439b0ccf2a31f29c4d357c86025da02421a224f243fa020a0213f89bed781198e1db

    • memory/2172-30-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB

    • memory/2172-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB

    • memory/2676-28-0x0000000000170000-0x0000000000236000-memory.dmp

      Filesize

      792KB

    • memory/2760-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2760-26-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB

    • memory/2760-24-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB

    • memory/2984-18-0x0000000000670000-0x0000000000671000-memory.dmp

      Filesize

      4KB

    • memory/2984-29-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB