Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 05:33

General

  • Target

    eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe

  • Size

    418KB

  • MD5

    eaadea7fd5b1de48f0c250f0f551d9f7

  • SHA1

    e92a7ccb76ef2019954e41185a1c904e2aea25e3

  • SHA256

    e5ffec7953bdc23f60b999c0d61551c2e0745e824e36a00c6f6fc5dfd4240b6f

  • SHA512

    0f19d6ab9ed77e97a3e4c3fcd3acafd782a686cc9d5f55711627db1e12bdb9904ca2c5fdd38dcc218c68f78449d828ee41620545af31e2b4856ded5a52499dbe

  • SSDEEP

    6144:tVSdQal6RjoZorLnMyATTgxKiNaq7D4d2w6Tl66uH99QJ6q/Yhoro9E/lWG:tVA6io+TcKwaGU9eLisoSYhuo9rG

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ffa63730de4107e1a9318d9252c356f

    SHA1

    f683188bcfd2cb8311106430c9ff6173b67bcbf0

    SHA256

    76f4dfc1a354d9c13b0e19a8fdc82f35d6c13e442848ea444051c11b14b2c3ad

    SHA512

    1a52d4068cb343b81a68144a9c9df00cafa4217a3d6955dffaa1334b01ccae0bbf7b1a67d84aba854bdd3471c8fd278cd1200ba79402b70111de60958b5a02a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69e4d4e39c4e9280bc80138747f26018

    SHA1

    9a1c62370469cc9da9ccc7a7a19b16f25c0b2e5e

    SHA256

    a83fab8cfbb42ae154ff60b1c7a0b12014671818422a5c41ef3f560e03e9cac4

    SHA512

    42d08e4b91abe473fef9ea722bfecb629d3cd920b2e1f91910526061a010750f47f8022acf052275b53ef00f33d42c471603e16654e5276be46cceb72b47d30d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df41ba4a0981301ead04866ab48f7d9b

    SHA1

    e0fbbe45acb95373d738bdc0e50e9ee138920f33

    SHA256

    ec5539524ec18559f9555ed245cf582617727fecabe46d5cc3b9ae7d94049278

    SHA512

    a4f9873a2ec56216155b16fd9cd65dcffe1ae0a9c9e782e6789037927c3399462cac84d633129535781aebd796f3e52be3ad1c1b820a9a0b7c11159e5ce45e83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05874d7686917e37c6d97de87ebc4dc4

    SHA1

    79500a48da227bb96f50df96bcadfa966c3de25a

    SHA256

    f9b93101ee4fc65244075b705fa8b4c93160727caf94ceb770c768eaff3c8dbf

    SHA512

    57c8814b20863b9e25ee1f3cbf4b08d07fa96d7d47e3a82b0a4c5701b1fb803c11260e09f978dbc07884182699a38e7bee2001355e5a3717381bb2077b687341

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e7d77e375403b51175597f435fb4656

    SHA1

    12da90f170647ba0aa65fa2a020452824caf2ea6

    SHA256

    1c06ffbff915685e9515c212e6c87907079c9022dadf91623a168b517664ca07

    SHA512

    2549e22f991da5b8f0305d5d587b409bec7bc1c5524a69402655e4b9f1c587231535fd0f79c674cb152832d20137c2c1babe5cce34e1ba76e2e3e73c3538dd77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96091f05ec28f7ef3a7e70fe05375a49

    SHA1

    a2c1d90f4622a328cb5bd92cc16aa7d40939cae2

    SHA256

    f5618d2b545479a722c540cb6d49b3d81d2773ac755372ceaa88035e8b367b25

    SHA512

    40ed3ac4d6005633254e6327e866400a47f0d592bc55e1cad7095f1aabcd9d12d7da9d9b08f2d0f5cc64dddd029ea16193fbf091f223f54ee864c974329336de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4c9694db4b0efe1c86d63dd4de13a8b

    SHA1

    5262a579ee85cdf856c5be363ce3f294c2e387de

    SHA256

    92c4bfc8d7a5ca54909c0a93807efe02f344f20c6fce24d4250d89f93dcd6af7

    SHA512

    c03548a06d611f53a892b858f862ed6393fcc2fb0a67908ecaa8a488e6cdf4b7f6571c3bff8a6db204b6095017078632f92574699bba8c53fcb57844ff765b18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    714c4f6e46b5c4096c76fd8ba2d89089

    SHA1

    6eded5121cec8c969eaaaca87e82d76b21a57d00

    SHA256

    9b47f91409edab8207110b47f1fb27c191b6bceb397ca8ca0872e003a7e73b01

    SHA512

    0e27bb4d7407e4ee05aabe4cccab63297c3a49b05b94c7507a00cb048b5d6ae54f3089ccfa7609d0e7aefc603453af6f498c4f73e69ad2e638c0cb07065ef41d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1593104137d8e5588d1650b6d1a22c7

    SHA1

    acd959caca0f15f681dceb0dca57341581c8b712

    SHA256

    f2969c74f304d1f1c2b2f309b2dc1ebad8236596a53a6f4b46fd92ca51ec7a84

    SHA512

    8dd57f5ab404d0c05e56550b6015acb448084b7c2e3b5e996eacb7243c1a336eba3c4d62d0c32bbe98cd55488ec5bc9b0c70ae013abfdd91a29baa65377fbf3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc61f06d2073b31512f4c86153a74b5c

    SHA1

    2d754702050157907349486e39bac6e8231630c3

    SHA256

    1c30ecb68836b57dfed4403fd95333dc7bf0de6eb505390e2467a7fe72a10094

    SHA512

    7d0efd21aa9751f3236a9c9c7783a070760892d40a3a68f06d47b8ed2e386c031dbe0a19983f419a675b7b2edbe8757788cf92d6a79dda58b18f6610b1c90fc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a34b481a4c5dd686ed57ae896193905

    SHA1

    6053bee89b5e3cd743f059ba852018f8db8610aa

    SHA256

    d0fa28dd2b37fcc68babfe7a75bd29c7b837d7ea12338f783aa7fedc2b87a59b

    SHA512

    884c6ccae509d18e51daeda9f72306426618c6079dd6a003ff1acc155c0151a4239d147689badebc12eadfd833639569680a5c073b3781dac9662014bf143ff1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61baaa211cca75d5749a1800c3419027

    SHA1

    d4b8af8d5500d931f29050890c1d5f43c5437675

    SHA256

    e414bb56b4da2a336438cd8a041304d1ba2b535ce6d0b7e4e241350e6e8d5b0c

    SHA512

    36cb40eeda6a4c751bfbb3c770eaba05417dd222fbe4223faeb3d1533aa406ae83c7c359c376500debcdf14bbd5f652af69408cc5f1020f8b5bbd955c7c32596

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3676990c4a4ea0f3d739cabafef50d2e

    SHA1

    badefb750ece6c0bc239a4cdd926dd1df3f24774

    SHA256

    ca82085f6958124b47d1e93e820229c8756f5aec96f6b3a5fea09ac8ed15b3be

    SHA512

    6cf2ef468af3fd7b6495729a689ade541bd49d9571373e49b702a5ea6523f8cdf7a5b4d3f97da817aa5b674f7f9a7283e196bc3d48135cf0d40bebeeab1ee1d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2be9cb2cb3188c34a42d4cb3eb35f26e

    SHA1

    bfb86c049666de53fc8828f6897191cf4e061369

    SHA256

    6d5f29cf99767b670dcab4b1a22587794a6d41fac355e11b5908b8e448678992

    SHA512

    2bcf7cf853b592998691ea97927932dde5056adb64cdf5252bd87e36b8e7b6a3fa859f9ddf8968dce629efdf85793b8a4caf258246327c6d64a68261514da59b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6252022176e28d9bc26fa5eef2940a4f

    SHA1

    14711f89fd3e0ed5806fd4f2d3cf8845d6925636

    SHA256

    8a8c548404ad6dd6426c38f93529b3b507384a5ecc67efe47fadb04a3fc36a5b

    SHA512

    b3b706093f176f9004555f82831140392b74c7652c686b553ae624ddd4013da4994d1807f93eff09126a985a9dfb3a986cc05cce36e2bade866ee70f6bcbee96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42401871c2e9f06cb6d690691f888ef0

    SHA1

    f0d760636f1b4933182db3fed7c81ff22449ef05

    SHA256

    8020d363d4130a955ba12add64d8ede2a6ae6158fbb29413b55c4f54fd8b651d

    SHA512

    4b83ee4801925827ef8d5b47cb109ce32bb1b2c028e1c565d337876dcdc63bbb88c25b518d64903267f78995b5f8e7b547d081468a29db364d0b43633861b1ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f927e9d96334b21f548aaa034aeab50

    SHA1

    ecbbe90c8de1aa73bc30e82752d3967d2dd070f6

    SHA256

    d1303c493f4987e524d2588d89330e0e9a376a31d1611db6527ac74dadded61c

    SHA512

    47203e9420ef699800f12f62d2f8bfbb29c2609b47cd13d9680725b20e678af8cd65f5c649c957255a0923850698c25be2893645f3f287226d32a019dd3af07e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f10caea89fde6690eb96e0fa98be3c1

    SHA1

    c67627925cbb7ba735ee5b9b954274242d649900

    SHA256

    c5d28f5fc821e3ddaac9090caf5ccd065fcacb2fd92a530c82eaecd03c0bb25a

    SHA512

    1d6da2ddfa678843338962b3b70e63be3216f91ba110f57f39d948fbc46d5c0726f0f3ad43d8d3fd002cce281682f5ca2b20baa732e5541f84d26145db56c42b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e5c993a43639aa2d17441e31bb9c4c8a

    SHA1

    711b3ed9f495c18f612d86133293c98ed89af353

    SHA256

    0b38b4ac9e8c517ee57a6d53992fc0435a19b003a063b664ce693906366769c1

    SHA512

    7f222a245911dda69187c070b671bccc118f055802c9ed6c5ca4413eddf9ea65bf9c6d542f5dc5ace9f49973d76f0abbfd85e960b6e982e1498ac8905c2ff5af

  • C:\Users\Admin\AppData\Local\Temp\Cab88F1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar89AF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2732-5-0x0000000000415000-0x0000000000416000-memory.dmp

    Filesize

    4KB

  • memory/2732-0-0x0000000000400000-0x0000000000530000-memory.dmp

    Filesize

    1.2MB

  • memory/2732-1-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2732-2-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2732-6-0x0000000000400000-0x0000000000530000-memory.dmp

    Filesize

    1.2MB

  • memory/2800-4-0x0000000000160000-0x0000000000290000-memory.dmp

    Filesize

    1.2MB