Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe
-
Size
450KB
-
MD5
ea5cadc4d6e74779f0416c96c9e58d5e
-
SHA1
c01d2714cafaa576aa292c3ab9973c256fc65f89
-
SHA256
7d46ce93f630a8c850333984f1da85ffdfdce4d9d44ac838573c2a021cc7756a
-
SHA512
5514e93314135d340754d670b6db509dad8003405a38dab4ff7d9aa68ea105ecb9cdc0705e15b7b62be2c72afcde094f0fa79485faff5c10cb41f44844113026
-
SSDEEP
6144:qRxPJ9AK2LvH4zvXxC5DeJXwhzVeHpJ8STjG4C3e7CgeQhhIV+tdYSSf9wPROVb:qRxxnpweBwj4k9J3/JVE+Vqpwb
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/3004-5-0x0000000000400000-0x00000000005360B0-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 3064 3004 ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF048ED1-7628-11EF-B38B-EAF82BEC9AF0} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432872206" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE 2180 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3064 3004 ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe 30 PID 3004 wrote to memory of 3064 3004 ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe 30 PID 3004 wrote to memory of 3064 3004 ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe 30 PID 3004 wrote to memory of 3064 3004 ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe 30 PID 3004 wrote to memory of 3064 3004 ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe 30 PID 3064 wrote to memory of 2180 3064 IEXPLORE.EXE 31 PID 3064 wrote to memory of 2180 3064 IEXPLORE.EXE 31 PID 3064 wrote to memory of 2180 3064 IEXPLORE.EXE 31 PID 3064 wrote to memory of 2180 3064 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c4abb956ee1290795637c15ac2651e
SHA1372ed555617e05190d6eb910c19583e89696b76b
SHA25610cfb1647279d2ccb641619e27737f9b391b540b8cad6a96b8c6ad4820011590
SHA512cd919fda08ced60d464ae42e4f9fb3418570dfb557e8bff7ab407d5373beded5e7628d98eb138e6148100d02a08bc15e377687efa9c9ed0742a9e2de44aa6dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cfd429916d50830195847a4ae277ca
SHA1ea42486bf5a29a3fe48505662d080528c49814d9
SHA256518990fa3e970716705e168bda5156a7b285acccdf845db84a2f3ccf4b21cc8e
SHA51241083e5acc66f354430235d3385d10bbf08ce07c2cb465f5664f56e4c81824a6dfced999ec70fc5b5dc7967e879a2ae71c82c796c9af086c384c540a6304b785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d0cdf7332895bcb37a1e6e08fe8bbb
SHA1f4b36188bde8944963bf52a7ab0d535209e4ebb3
SHA2565cceb36e935e4d3a739da9005291c765b43c9440fd9acfceb972254f562ac7ce
SHA512066720a44f897c91c2243ee8a3c7bb324fafd67669f7daf2395c312c8dda50b78c8dc4bbf0d53c5af996b661a030599f7e4627eec25eb1f0184d2f46cd4399f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f71b2c8d3e378e0c34aa1913f41be09
SHA1cc11525819c436cb911d58f7339f78030fc9143c
SHA256507588c4175cf23a854578b0e445aaf19af02be10229775df47b79bb38dc7d62
SHA5126f25bc17dc3fdf06c859d7f8088014b14079b03d17dc41426f0e5f0cd70b91bf4251ae5bcacb346d798953b2fe6a81fe22b2553436ed895f1b69d38ea9299ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556715aaaf5ee5d9269fed4d84b019112
SHA1ae6f72d4263b71b65fce6c254db7f7cb56772504
SHA256c8060b2d7513ba1b01d6e280fdb92cae7ae63a8cafccf91bc541faeebedb41ab
SHA512eca6b1ec1b04a306a11b9cec33e66905003962f343a19b03f9615461768af887dd5bc4d906080294f9d4ac94e5162ae82180bafcac3a6b353f70b551aaa3f7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a5b538b728a5e67bb6231864c3cd40
SHA17dad53bdff6bfcbcaf2737ca48a33ff29f168c52
SHA256da831353ad92895810cd1611b6dcc96ea72d3f8aac46085f073929a833e70c06
SHA5123a14e4bea23dcc73f977f2813c612d633d0cdfb3e58268d0b29c1c41d8574ec539fe206b7aa42f58dce4b474d96ab6092eacfa738fa5ba7651f1b1de96d5f4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ea93732337663de510c9241118c0a0
SHA156ca117bf9b3403c4e70205780b7821a96654a70
SHA25665eb7ec0510301f2331b46a2576404a31bc869b3467c4f0171577bea6ed647ff
SHA51264c0f585a94a5a43d19d3c22f2dac88393d0e7fe47115025efc960caa928a35c0be6fcc3dd1abf8e06b1c4eadd50fbcc129786aa13d05102ebc54721596ba019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c922a91e4462ce3135f11b09c13471
SHA1617f47db7730d06f64508a1212bbf6364280a5da
SHA256e93de2ff548670b6b039948a6ca109a4a0604a12e2b5b2a04f642e5d2ba449a8
SHA5120ae2d3ec1ba110a2cd27a937b87f5a52803f58db6abbba8250e1272ef08c2cf00bc45af19d051c625f07600c4ca9eae2a54631b45d607dd390e09231fe452187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf792eb63f4271ba63cc21f31b5ab229
SHA1a61e40d616406b1f1dfa9453c3b4b64efbdf2254
SHA25632d44cbb627e54a63002ed48126936e92a690596331903f1ecb70399ea9325ec
SHA512adadd901faa36d6a34dcd9aa421b612d6b1810d473a2c90e79e8fc013e22bdbeb8946e33e77253b591cca1312d58288d2e486a119356919870c865be370fa043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c040fcf1d38b4de6f9b9431d69c829
SHA1cde9813b63c2103c83271528a2f281b635e4c5a0
SHA2563422d3f419904b30f9f157c2aa072e8a8104063fd365c0ef067b9944836efd6f
SHA5125a353e033d59d537991a4a18e07f07dbd20be46b27f5e4a00ecc5879badf2ffb83e40bed2e183bb46bf538555e327c5722c86cb4820cf9aabe50c198e4cdbe75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55662b91295102f05853780b24ab8b9df
SHA16d6e90bc0c90ed6d8cf556467003237d241a641c
SHA256587a388a5e6144014b08ef6c32706892d0eab627c3fcc2cc0021bd2def058f96
SHA512951f3571e51de2480e606426b3003fa3be89077f9c7ccb3931a230b09af52ae55e8a84d4f853f97ccd59ff1c6aa1cd61ea642c90bc59b5cb2cdc54e8098cb2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530dec22921d4af0c8e3a71917f284acd
SHA1b849aba068470c502c8bbcb2bf777347344d6d04
SHA25672882691a32099c31eefe197444c7ef63736be3906e93472900c062125edff7d
SHA512b75654b7b447b9ec0a26dd5378871bad76eca1bf97c2f062bf9d5aba039ce494dbf18a46e853cf921e5037e8b115d6092e534bfff36e8c1f957d3a50af7a1e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543dd93be683f1962e93417e8ad4d0428
SHA1669c1feabe7cad77352da0011f7eaab3747b32a4
SHA256615dbb13a46ac8dcc16059d0e2d84c414fc35345b2716593be00c77e6f9ee779
SHA5121f723a59bf4b1defd98aba1b6b1166cf98773ba0f5401671f8a23aff5289355ef554e9da991f98fd09d546fc3a6c004ebf9f51704034790b42e9115844dff117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69a75888dc36315b15dc528b0decfbe
SHA1fe397f765c71fe442a90af2275355567f30daa03
SHA2568569db65598893ebcc734151ec897463633ecb8d15510c935c4c6dd47d26a394
SHA5129af10c05fd7b87eef77059478fe78ff76d251952864eb1fda2ee551350702ffe50c970b879c7b5bc2501aa6b742745a0982f4d0686a1f8fedd65a430a986957c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54defdf60f6e86f79ef7404381e3f9eab
SHA1094d1fb54fd627bd39ddb98af8bcc5e19b4aa6e8
SHA25660194bb70c942c2a01f5b0bc83003105a4a61851a04a2ba077de11d83e9ab5eb
SHA512ec79e8316324088783fe8350b647318176966d1e2b4fc34055de01a0bbc8881d88394cce7096007a1292b5d55aa57761c7c08e17729054c9da56a9cd014bd3d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed9132ac0cf4f6944f2c3e567fa42c2
SHA1088b148e13f2b8199c1ac657660f1ec0eaa77ccb
SHA256602dafc35b435606bfb53a506ef3a391b2a212fa46d162397db73b668b188836
SHA512d3a48b5f0ad1fe5a836470a3657f4c4cd61be2939d5c323ab1fd7800d4a4b9e5327cecd4831f16c347bb5c8b5c05f6bebff5944f270baba79770f65d1e19ea60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a3243952affd37a314d97f4994343e6
SHA167e740ac0de0d0ce87a179f2002f53c9ba9c6efc
SHA256b034789440e9681acef659cd0b6856c83b1a7ef2771000ce0815860a14320948
SHA512607903c9cd93c4e85926749b5e493ff1ec9dd54c934c5474b9d0f841dc66a6a4fe827a6b0821b9714b82df4cb6c54a5d2beed88ce34410fb9a5e647ba4bd5d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd776fd9d020eaecdb718d134ba5203
SHA1ced1e2809819669697e9369463eb9471d0163650
SHA256899d2218af63562803fff7f3c80e5f47811aa39af8c355c0c6ab98be80e21be0
SHA512da96ace4b85702f321c1ca4dc84b7ac45183c775321ed929ac83d556e61cf886377ee3f01e21af3ce291def3f1ce971221858036f5979a219a4c0dbb6ee20def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57720954df2dabd133aa05e910597da38
SHA10d56b6780cf546110ae71bd1c608d83c7bb69369
SHA256a9a5d01d3e3033ec806b81e1ece2dfcea4039ac0b8df150f051393f858282f00
SHA512e9281ce58458d594c190381ddfb2fc6167624d5f10e2e9afef15490ff11f26976dd4e8cf9d96dbca6e9d0ec09599cfb1453a2a2ae27d522fd988ffdffbcfe242
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b