Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 05:33
Behavioral task
behavioral1
Sample
eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe
-
Size
418KB
-
MD5
eaadea7fd5b1de48f0c250f0f551d9f7
-
SHA1
e92a7ccb76ef2019954e41185a1c904e2aea25e3
-
SHA256
e5ffec7953bdc23f60b999c0d61551c2e0745e824e36a00c6f6fc5dfd4240b6f
-
SHA512
0f19d6ab9ed77e97a3e4c3fcd3acafd782a686cc9d5f55711627db1e12bdb9904ca2c5fdd38dcc218c68f78449d828ee41620545af31e2b4856ded5a52499dbe
-
SSDEEP
6144:tVSdQal6RjoZorLnMyATTgxKiNaq7D4d2w6Tl66uH99QJ6q/Yhoro9E/lWG:tVA6io+TcKwaGU9eLisoSYhuo9rG
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2732-6-0x0000000000400000-0x0000000000530000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral1/memory/2732-0-0x0000000000400000-0x0000000000530000-memory.dmp vmprotect behavioral1/memory/2800-4-0x0000000000160000-0x0000000000290000-memory.dmp vmprotect behavioral1/memory/2732-6-0x0000000000400000-0x0000000000530000-memory.dmp vmprotect -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\2010.txt eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2732 eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2732 set thread context of 2800 2732 eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885884" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7E07C41-7648-11EF-838F-D692ACB8436A} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2800 2732 eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2800 2732 eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2800 2732 eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2800 2732 eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2800 2732 eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2096 2800 IEXPLORE.EXE 31 PID 2800 wrote to memory of 2096 2800 IEXPLORE.EXE 31 PID 2800 wrote to memory of 2096 2800 IEXPLORE.EXE 31 PID 2800 wrote to memory of 2096 2800 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaadea7fd5b1de48f0c250f0f551d9f7_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffa63730de4107e1a9318d9252c356f
SHA1f683188bcfd2cb8311106430c9ff6173b67bcbf0
SHA25676f4dfc1a354d9c13b0e19a8fdc82f35d6c13e442848ea444051c11b14b2c3ad
SHA5121a52d4068cb343b81a68144a9c9df00cafa4217a3d6955dffaa1334b01ccae0bbf7b1a67d84aba854bdd3471c8fd278cd1200ba79402b70111de60958b5a02a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e4d4e39c4e9280bc80138747f26018
SHA19a1c62370469cc9da9ccc7a7a19b16f25c0b2e5e
SHA256a83fab8cfbb42ae154ff60b1c7a0b12014671818422a5c41ef3f560e03e9cac4
SHA51242d08e4b91abe473fef9ea722bfecb629d3cd920b2e1f91910526061a010750f47f8022acf052275b53ef00f33d42c471603e16654e5276be46cceb72b47d30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df41ba4a0981301ead04866ab48f7d9b
SHA1e0fbbe45acb95373d738bdc0e50e9ee138920f33
SHA256ec5539524ec18559f9555ed245cf582617727fecabe46d5cc3b9ae7d94049278
SHA512a4f9873a2ec56216155b16fd9cd65dcffe1ae0a9c9e782e6789037927c3399462cac84d633129535781aebd796f3e52be3ad1c1b820a9a0b7c11159e5ce45e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505874d7686917e37c6d97de87ebc4dc4
SHA179500a48da227bb96f50df96bcadfa966c3de25a
SHA256f9b93101ee4fc65244075b705fa8b4c93160727caf94ceb770c768eaff3c8dbf
SHA51257c8814b20863b9e25ee1f3cbf4b08d07fa96d7d47e3a82b0a4c5701b1fb803c11260e09f978dbc07884182699a38e7bee2001355e5a3717381bb2077b687341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7d77e375403b51175597f435fb4656
SHA112da90f170647ba0aa65fa2a020452824caf2ea6
SHA2561c06ffbff915685e9515c212e6c87907079c9022dadf91623a168b517664ca07
SHA5122549e22f991da5b8f0305d5d587b409bec7bc1c5524a69402655e4b9f1c587231535fd0f79c674cb152832d20137c2c1babe5cce34e1ba76e2e3e73c3538dd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596091f05ec28f7ef3a7e70fe05375a49
SHA1a2c1d90f4622a328cb5bd92cc16aa7d40939cae2
SHA256f5618d2b545479a722c540cb6d49b3d81d2773ac755372ceaa88035e8b367b25
SHA51240ed3ac4d6005633254e6327e866400a47f0d592bc55e1cad7095f1aabcd9d12d7da9d9b08f2d0f5cc64dddd029ea16193fbf091f223f54ee864c974329336de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c9694db4b0efe1c86d63dd4de13a8b
SHA15262a579ee85cdf856c5be363ce3f294c2e387de
SHA25692c4bfc8d7a5ca54909c0a93807efe02f344f20c6fce24d4250d89f93dcd6af7
SHA512c03548a06d611f53a892b858f862ed6393fcc2fb0a67908ecaa8a488e6cdf4b7f6571c3bff8a6db204b6095017078632f92574699bba8c53fcb57844ff765b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5714c4f6e46b5c4096c76fd8ba2d89089
SHA16eded5121cec8c969eaaaca87e82d76b21a57d00
SHA2569b47f91409edab8207110b47f1fb27c191b6bceb397ca8ca0872e003a7e73b01
SHA5120e27bb4d7407e4ee05aabe4cccab63297c3a49b05b94c7507a00cb048b5d6ae54f3089ccfa7609d0e7aefc603453af6f498c4f73e69ad2e638c0cb07065ef41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1593104137d8e5588d1650b6d1a22c7
SHA1acd959caca0f15f681dceb0dca57341581c8b712
SHA256f2969c74f304d1f1c2b2f309b2dc1ebad8236596a53a6f4b46fd92ca51ec7a84
SHA5128dd57f5ab404d0c05e56550b6015acb448084b7c2e3b5e996eacb7243c1a336eba3c4d62d0c32bbe98cd55488ec5bc9b0c70ae013abfdd91a29baa65377fbf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc61f06d2073b31512f4c86153a74b5c
SHA12d754702050157907349486e39bac6e8231630c3
SHA2561c30ecb68836b57dfed4403fd95333dc7bf0de6eb505390e2467a7fe72a10094
SHA5127d0efd21aa9751f3236a9c9c7783a070760892d40a3a68f06d47b8ed2e386c031dbe0a19983f419a675b7b2edbe8757788cf92d6a79dda58b18f6610b1c90fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a34b481a4c5dd686ed57ae896193905
SHA16053bee89b5e3cd743f059ba852018f8db8610aa
SHA256d0fa28dd2b37fcc68babfe7a75bd29c7b837d7ea12338f783aa7fedc2b87a59b
SHA512884c6ccae509d18e51daeda9f72306426618c6079dd6a003ff1acc155c0151a4239d147689badebc12eadfd833639569680a5c073b3781dac9662014bf143ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561baaa211cca75d5749a1800c3419027
SHA1d4b8af8d5500d931f29050890c1d5f43c5437675
SHA256e414bb56b4da2a336438cd8a041304d1ba2b535ce6d0b7e4e241350e6e8d5b0c
SHA51236cb40eeda6a4c751bfbb3c770eaba05417dd222fbe4223faeb3d1533aa406ae83c7c359c376500debcdf14bbd5f652af69408cc5f1020f8b5bbd955c7c32596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53676990c4a4ea0f3d739cabafef50d2e
SHA1badefb750ece6c0bc239a4cdd926dd1df3f24774
SHA256ca82085f6958124b47d1e93e820229c8756f5aec96f6b3a5fea09ac8ed15b3be
SHA5126cf2ef468af3fd7b6495729a689ade541bd49d9571373e49b702a5ea6523f8cdf7a5b4d3f97da817aa5b674f7f9a7283e196bc3d48135cf0d40bebeeab1ee1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be9cb2cb3188c34a42d4cb3eb35f26e
SHA1bfb86c049666de53fc8828f6897191cf4e061369
SHA2566d5f29cf99767b670dcab4b1a22587794a6d41fac355e11b5908b8e448678992
SHA5122bcf7cf853b592998691ea97927932dde5056adb64cdf5252bd87e36b8e7b6a3fa859f9ddf8968dce629efdf85793b8a4caf258246327c6d64a68261514da59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56252022176e28d9bc26fa5eef2940a4f
SHA114711f89fd3e0ed5806fd4f2d3cf8845d6925636
SHA2568a8c548404ad6dd6426c38f93529b3b507384a5ecc67efe47fadb04a3fc36a5b
SHA512b3b706093f176f9004555f82831140392b74c7652c686b553ae624ddd4013da4994d1807f93eff09126a985a9dfb3a986cc05cce36e2bade866ee70f6bcbee96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542401871c2e9f06cb6d690691f888ef0
SHA1f0d760636f1b4933182db3fed7c81ff22449ef05
SHA2568020d363d4130a955ba12add64d8ede2a6ae6158fbb29413b55c4f54fd8b651d
SHA5124b83ee4801925827ef8d5b47cb109ce32bb1b2c028e1c565d337876dcdc63bbb88c25b518d64903267f78995b5f8e7b547d081468a29db364d0b43633861b1ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f927e9d96334b21f548aaa034aeab50
SHA1ecbbe90c8de1aa73bc30e82752d3967d2dd070f6
SHA256d1303c493f4987e524d2588d89330e0e9a376a31d1611db6527ac74dadded61c
SHA51247203e9420ef699800f12f62d2f8bfbb29c2609b47cd13d9680725b20e678af8cd65f5c649c957255a0923850698c25be2893645f3f287226d32a019dd3af07e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f10caea89fde6690eb96e0fa98be3c1
SHA1c67627925cbb7ba735ee5b9b954274242d649900
SHA256c5d28f5fc821e3ddaac9090caf5ccd065fcacb2fd92a530c82eaecd03c0bb25a
SHA5121d6da2ddfa678843338962b3b70e63be3216f91ba110f57f39d948fbc46d5c0726f0f3ad43d8d3fd002cce281682f5ca2b20baa732e5541f84d26145db56c42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c993a43639aa2d17441e31bb9c4c8a
SHA1711b3ed9f495c18f612d86133293c98ed89af353
SHA2560b38b4ac9e8c517ee57a6d53992fc0435a19b003a063b664ce693906366769c1
SHA5127f222a245911dda69187c070b671bccc118f055802c9ed6c5ca4413eddf9ea65bf9c6d542f5dc5ace9f49973d76f0abbfd85e960b6e982e1498ac8905c2ff5af
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b