Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 01:45

General

  • Target

    ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe

  • Size

    450KB

  • MD5

    ea5cadc4d6e74779f0416c96c9e58d5e

  • SHA1

    c01d2714cafaa576aa292c3ab9973c256fc65f89

  • SHA256

    7d46ce93f630a8c850333984f1da85ffdfdce4d9d44ac838573c2a021cc7756a

  • SHA512

    5514e93314135d340754d670b6db509dad8003405a38dab4ff7d9aa68ea105ecb9cdc0705e15b7b62be2c72afcde094f0fa79485faff5c10cb41f44844113026

  • SSDEEP

    6144:qRxPJ9AK2LvH4zvXxC5DeJXwhzVeHpJ8STjG4C3e7CgeQhhIV+tdYSSf9wPROVb:qRxxnpweBwj4k9J3/JVE+Vqpwb

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea5cadc4d6e74779f0416c96c9e58d5e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4c4abb956ee1290795637c15ac2651e

    SHA1

    372ed555617e05190d6eb910c19583e89696b76b

    SHA256

    10cfb1647279d2ccb641619e27737f9b391b540b8cad6a96b8c6ad4820011590

    SHA512

    cd919fda08ced60d464ae42e4f9fb3418570dfb557e8bff7ab407d5373beded5e7628d98eb138e6148100d02a08bc15e377687efa9c9ed0742a9e2de44aa6dd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31cfd429916d50830195847a4ae277ca

    SHA1

    ea42486bf5a29a3fe48505662d080528c49814d9

    SHA256

    518990fa3e970716705e168bda5156a7b285acccdf845db84a2f3ccf4b21cc8e

    SHA512

    41083e5acc66f354430235d3385d10bbf08ce07c2cb465f5664f56e4c81824a6dfced999ec70fc5b5dc7967e879a2ae71c82c796c9af086c384c540a6304b785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1d0cdf7332895bcb37a1e6e08fe8bbb

    SHA1

    f4b36188bde8944963bf52a7ab0d535209e4ebb3

    SHA256

    5cceb36e935e4d3a739da9005291c765b43c9440fd9acfceb972254f562ac7ce

    SHA512

    066720a44f897c91c2243ee8a3c7bb324fafd67669f7daf2395c312c8dda50b78c8dc4bbf0d53c5af996b661a030599f7e4627eec25eb1f0184d2f46cd4399f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f71b2c8d3e378e0c34aa1913f41be09

    SHA1

    cc11525819c436cb911d58f7339f78030fc9143c

    SHA256

    507588c4175cf23a854578b0e445aaf19af02be10229775df47b79bb38dc7d62

    SHA512

    6f25bc17dc3fdf06c859d7f8088014b14079b03d17dc41426f0e5f0cd70b91bf4251ae5bcacb346d798953b2fe6a81fe22b2553436ed895f1b69d38ea9299ffa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56715aaaf5ee5d9269fed4d84b019112

    SHA1

    ae6f72d4263b71b65fce6c254db7f7cb56772504

    SHA256

    c8060b2d7513ba1b01d6e280fdb92cae7ae63a8cafccf91bc541faeebedb41ab

    SHA512

    eca6b1ec1b04a306a11b9cec33e66905003962f343a19b03f9615461768af887dd5bc4d906080294f9d4ac94e5162ae82180bafcac3a6b353f70b551aaa3f7f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59a5b538b728a5e67bb6231864c3cd40

    SHA1

    7dad53bdff6bfcbcaf2737ca48a33ff29f168c52

    SHA256

    da831353ad92895810cd1611b6dcc96ea72d3f8aac46085f073929a833e70c06

    SHA512

    3a14e4bea23dcc73f977f2813c612d633d0cdfb3e58268d0b29c1c41d8574ec539fe206b7aa42f58dce4b474d96ab6092eacfa738fa5ba7651f1b1de96d5f4ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08ea93732337663de510c9241118c0a0

    SHA1

    56ca117bf9b3403c4e70205780b7821a96654a70

    SHA256

    65eb7ec0510301f2331b46a2576404a31bc869b3467c4f0171577bea6ed647ff

    SHA512

    64c0f585a94a5a43d19d3c22f2dac88393d0e7fe47115025efc960caa928a35c0be6fcc3dd1abf8e06b1c4eadd50fbcc129786aa13d05102ebc54721596ba019

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39c922a91e4462ce3135f11b09c13471

    SHA1

    617f47db7730d06f64508a1212bbf6364280a5da

    SHA256

    e93de2ff548670b6b039948a6ca109a4a0604a12e2b5b2a04f642e5d2ba449a8

    SHA512

    0ae2d3ec1ba110a2cd27a937b87f5a52803f58db6abbba8250e1272ef08c2cf00bc45af19d051c625f07600c4ca9eae2a54631b45d607dd390e09231fe452187

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf792eb63f4271ba63cc21f31b5ab229

    SHA1

    a61e40d616406b1f1dfa9453c3b4b64efbdf2254

    SHA256

    32d44cbb627e54a63002ed48126936e92a690596331903f1ecb70399ea9325ec

    SHA512

    adadd901faa36d6a34dcd9aa421b612d6b1810d473a2c90e79e8fc013e22bdbeb8946e33e77253b591cca1312d58288d2e486a119356919870c865be370fa043

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5c040fcf1d38b4de6f9b9431d69c829

    SHA1

    cde9813b63c2103c83271528a2f281b635e4c5a0

    SHA256

    3422d3f419904b30f9f157c2aa072e8a8104063fd365c0ef067b9944836efd6f

    SHA512

    5a353e033d59d537991a4a18e07f07dbd20be46b27f5e4a00ecc5879badf2ffb83e40bed2e183bb46bf538555e327c5722c86cb4820cf9aabe50c198e4cdbe75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5662b91295102f05853780b24ab8b9df

    SHA1

    6d6e90bc0c90ed6d8cf556467003237d241a641c

    SHA256

    587a388a5e6144014b08ef6c32706892d0eab627c3fcc2cc0021bd2def058f96

    SHA512

    951f3571e51de2480e606426b3003fa3be89077f9c7ccb3931a230b09af52ae55e8a84d4f853f97ccd59ff1c6aa1cd61ea642c90bc59b5cb2cdc54e8098cb2d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30dec22921d4af0c8e3a71917f284acd

    SHA1

    b849aba068470c502c8bbcb2bf777347344d6d04

    SHA256

    72882691a32099c31eefe197444c7ef63736be3906e93472900c062125edff7d

    SHA512

    b75654b7b447b9ec0a26dd5378871bad76eca1bf97c2f062bf9d5aba039ce494dbf18a46e853cf921e5037e8b115d6092e534bfff36e8c1f957d3a50af7a1e04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43dd93be683f1962e93417e8ad4d0428

    SHA1

    669c1feabe7cad77352da0011f7eaab3747b32a4

    SHA256

    615dbb13a46ac8dcc16059d0e2d84c414fc35345b2716593be00c77e6f9ee779

    SHA512

    1f723a59bf4b1defd98aba1b6b1166cf98773ba0f5401671f8a23aff5289355ef554e9da991f98fd09d546fc3a6c004ebf9f51704034790b42e9115844dff117

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c69a75888dc36315b15dc528b0decfbe

    SHA1

    fe397f765c71fe442a90af2275355567f30daa03

    SHA256

    8569db65598893ebcc734151ec897463633ecb8d15510c935c4c6dd47d26a394

    SHA512

    9af10c05fd7b87eef77059478fe78ff76d251952864eb1fda2ee551350702ffe50c970b879c7b5bc2501aa6b742745a0982f4d0686a1f8fedd65a430a986957c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4defdf60f6e86f79ef7404381e3f9eab

    SHA1

    094d1fb54fd627bd39ddb98af8bcc5e19b4aa6e8

    SHA256

    60194bb70c942c2a01f5b0bc83003105a4a61851a04a2ba077de11d83e9ab5eb

    SHA512

    ec79e8316324088783fe8350b647318176966d1e2b4fc34055de01a0bbc8881d88394cce7096007a1292b5d55aa57761c7c08e17729054c9da56a9cd014bd3d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ed9132ac0cf4f6944f2c3e567fa42c2

    SHA1

    088b148e13f2b8199c1ac657660f1ec0eaa77ccb

    SHA256

    602dafc35b435606bfb53a506ef3a391b2a212fa46d162397db73b668b188836

    SHA512

    d3a48b5f0ad1fe5a836470a3657f4c4cd61be2939d5c323ab1fd7800d4a4b9e5327cecd4831f16c347bb5c8b5c05f6bebff5944f270baba79770f65d1e19ea60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a3243952affd37a314d97f4994343e6

    SHA1

    67e740ac0de0d0ce87a179f2002f53c9ba9c6efc

    SHA256

    b034789440e9681acef659cd0b6856c83b1a7ef2771000ce0815860a14320948

    SHA512

    607903c9cd93c4e85926749b5e493ff1ec9dd54c934c5474b9d0f841dc66a6a4fe827a6b0821b9714b82df4cb6c54a5d2beed88ce34410fb9a5e647ba4bd5d85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccd776fd9d020eaecdb718d134ba5203

    SHA1

    ced1e2809819669697e9369463eb9471d0163650

    SHA256

    899d2218af63562803fff7f3c80e5f47811aa39af8c355c0c6ab98be80e21be0

    SHA512

    da96ace4b85702f321c1ca4dc84b7ac45183c775321ed929ac83d556e61cf886377ee3f01e21af3ce291def3f1ce971221858036f5979a219a4c0dbb6ee20def

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7720954df2dabd133aa05e910597da38

    SHA1

    0d56b6780cf546110ae71bd1c608d83c7bb69369

    SHA256

    a9a5d01d3e3033ec806b81e1ece2dfcea4039ac0b8df150f051393f858282f00

    SHA512

    e9281ce58458d594c190381ddfb2fc6167624d5f10e2e9afef15490ff11f26976dd4e8cf9d96dbca6e9d0ec09599cfb1453a2a2ae27d522fd988ffdffbcfe242

  • C:\Users\Admin\AppData\Local\Temp\CabD3D4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD436.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3004-5-0x0000000000400000-0x00000000005360B0-memory.dmp

    Filesize

    1.2MB

  • memory/3004-0-0x0000000000400000-0x00000000005360B0-memory.dmp

    Filesize

    1.2MB

  • memory/3004-1-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/3004-4-0x0000000000415000-0x0000000000416000-memory.dmp

    Filesize

    4KB

  • memory/3064-3-0x0000000000160000-0x0000000000297000-memory.dmp

    Filesize

    1.2MB