Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 13:53

General

  • Target

    eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe

  • Size

    852KB

  • MD5

    eb784f224b2a3a748c402cd9888c5975

  • SHA1

    a3bbc3b7d0d667832cf85d3124464d811737e9b1

  • SHA256

    b1a3c29e2fb81855d6bc540243ccbf215d7baa75b3675d306dd4937825e83267

  • SHA512

    48fadfcaf6ac62b4ad4913d6b5c41f87037f695bffd6b07feac832ababb2915c26824875708d1ca869103677dea1a030529699598a68629fa025a1d948977557

  • SSDEEP

    12288:wVCvN53f0cwbd4smgNf4ItP2q/J+fjqrxKyOsnDgVTFqCncSgC:lf0/d/xxU+7KywVT7cs

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb784f224b2a3a748c402cd9888c5975_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp
      "C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\\456_6232847321688.swf"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\456_6232847321688.swf
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2620
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\456_6232847321688.swf
            5⤵
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:316
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:316 CREDAT:275457 /prefetch:2
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:532
      • C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp
        "C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          4⤵
            PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4cf223c96ef228184b6c00f3ba2baeff

      SHA1

      b5f90cc75f20a79675ac4952ee7e9a65ce89346b

      SHA256

      053c77428396ab1b2f94424b2255f984ca3f62b3a2db3046102eaaf5d0b164e5

      SHA512

      20527d36afa0343338a2206559b19b95bb05bd2d8efa458fe17b07617dc46d1797cb63be97df537ba4bdc4c2718ffd32f7c693f1f969beb53283ce8d907655be

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      80d921ff65308fb17dd2bdfe7aa8213e

      SHA1

      6be14067f4251a9ffa409ffbd621437e10261298

      SHA256

      46ab73d64b501ba748f976968bb17ec4881eebc49d0c4c9f36f28d5f287a3c3c

      SHA512

      a3a150211b1856be748ef7ac86c1681cc732c1fe1aa1d8fcf553882c3f071f1695d05126f681fe30d1f4617de82a7c2930709e4ce4e49143c4f757961ae63b3e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      29e876846b0c1e4f7c6d4cf07c28772e

      SHA1

      8f2d16e01495f352828e1f497c68a5cc49f194d0

      SHA256

      c359095e267516b0a56d0290e8f63537605e1dccac8cdcd37e5d12c2b7b9605b

      SHA512

      fa8299eb2465b2e2acd4967b37e0cb1970351a28a3369ec23b72b23c782dc1f1cfba1253070877bf3c9165351ea074431811208f80d0c574e68c060a35ab1b0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9093d67ccb308f3c0d809f9797324303

      SHA1

      9ac9c7f4faf9b87566cbde067c4673fea990e92d

      SHA256

      de619158c43fd10dda472db2181f822ee143fa46f15ac414e21ed51a1ea5fab2

      SHA512

      b315d1d4217cbba472a1dd7363b4359ae12aec218703d2c6245979864e9b071d84d0ea0e37b09b5b0bf3b1a582a7b684d5b5ff96ac9fc2f0fe2951d8fb3a768f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04de06114ef5d4d69849953b728d8833

      SHA1

      3915090dda8fdcad9e34af6ce003a7b5172b5f60

      SHA256

      bbf5b73a6125cb56004de74119165c26368ad09b6e823b8ef0e6a7c993297f26

      SHA512

      79e3beb983959aa3be1afbc5a42e6c14c18ccd9784de94b95f0ff7bc87c2ac9b431e9b3bf19149d2859b880cd3a7e6f63e3ab5773623e5b494524527fd7e123e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4150f7a9c9aa1598e9cc5379de857c5f

      SHA1

      d1a7ebada27d5b9b5edec0fcf3ba028b5c2824a8

      SHA256

      febab6fc6dc5b7742cd6a3662f2265b44542f356e8935ed9beff52e4b8a8b0b1

      SHA512

      24b3ff44d1159fb50c2e3d7286a29b42f16d7b0dc0ba0d24307ae211f24e2d44cf77bb0637ae8ed39692d6d1ce0205653ea3aac4876f52cbfff30ca9b5cf494b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4fb574a8f7fc9dc4b0743ce45eb114a9

      SHA1

      3e33e211d579267378c4122cdcd00cf068c59b0a

      SHA256

      e5976bbbbd2c96b9288e5f8e964eaf2a0f2f539018e32d30785ceccb3325b671

      SHA512

      0a823148c46fdb402c8670c1ceabcfb81f0f6ddde33d60202618a3e260033206babd4f73bc208def9689a3b29b9d12bc0d21a6f73ab451434932710fef82c484

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8dedd2749a38d29cd1ec4ee15453cf4f

      SHA1

      a9c0ec9a6afb7c81d25c527c28ceb0ad5bf9e8c7

      SHA256

      5960b7798ffc479e35c98da3422e9fb482d0c5c3388ded2d07fae99d3f676d68

      SHA512

      41727cc9ea636509d60fed6f75d4607221e42badcea699a7b8268b6a4219597d064bc4f2fc76e13a38462ec74fa8fbc41ba030e3ae03dc4f5d3d7d6a1c46340b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8b6bed4c9ef378858aa179f04e774034

      SHA1

      cfa044cf05b4f26a7dae4977c43f082a6183488d

      SHA256

      d4c2017a0a685fc1cd1783933f07e26d04acfc732fd6278febdc55b0ba5c55d6

      SHA512

      c475e284109778a4bff2df063afa594dd971b93517789ee2419ac1335dd5cbb046e24586474ce43424cb2c3592849ba35f02cf178ab95b833f1052a59cf7e11a

    • C:\Users\Admin\AppData\Local\Temp\456_6232847321688.swf

      Filesize

      86KB

      MD5

      bf1eb89e01dea878a8a06b09db19818b

      SHA1

      a00289016403355ef3f4d2ddaca74d24736352d3

      SHA256

      3a4823432714f075144a508a593b8082e7bef2787e55476811681305a137cb82

      SHA512

      0e6dbe227ecad140d3d87bab2315a251cd6eae5bc0dd0cc5cc63d03c2b5befd19a4ee4c613a49e85eefc9c78ce711acabd5cc8305a0a87e50b28394588180573

    • C:\Users\Admin\AppData\Local\Temp\CabC67C.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC72D.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\pzpA0A3.tmp

      Filesize

      829KB

      MD5

      ccc8aa68129c9f080c3364b5b494e860

      SHA1

      13b5c71a97239f31532ab189a4459a1fd99c2b4d

      SHA256

      e6ac3f7257ec522fbce5d0dd079811ecd340537f02ad3358a47562af50eac1f7

      SHA512

      42a1ba54c1f2728709242af6dc9fafaab06ad084f8a9b18880c8e3d4c420095c3cbd988ae7a3a3d682fded347e6c9f728c4c29d093b022f69712694c64b13167

    • memory/1628-25-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-19-0x0000000001E80000-0x0000000001E81000-memory.dmp

      Filesize

      4KB

    • memory/1628-38-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-37-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-36-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-35-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-34-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-33-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-32-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-31-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-30-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-29-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-28-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-27-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-26-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-40-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-24-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-23-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-22-0x0000000003200000-0x0000000003201000-memory.dmp

      Filesize

      4KB

    • memory/1628-21-0x0000000000670000-0x0000000000671000-memory.dmp

      Filesize

      4KB

    • memory/1628-20-0x0000000001EB0000-0x0000000001EB1000-memory.dmp

      Filesize

      4KB

    • memory/1628-39-0x00000000031F0000-0x00000000031F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-18-0x0000000001E90000-0x0000000001E91000-memory.dmp

      Filesize

      4KB

    • memory/1628-17-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/1628-16-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB

    • memory/1628-15-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

      Filesize

      4KB

    • memory/1628-14-0x0000000001E10000-0x0000000001E11000-memory.dmp

      Filesize

      4KB

    • memory/1628-13-0x0000000001E70000-0x0000000001E71000-memory.dmp

      Filesize

      4KB

    • memory/1628-12-0x00000000002D0000-0x0000000000324000-memory.dmp

      Filesize

      336KB

    • memory/1628-11-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/1628-79-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/1628-41-0x00000000002D0000-0x0000000000324000-memory.dmp

      Filesize

      336KB

    • memory/1628-42-0x00000000031E0000-0x00000000031E9000-memory.dmp

      Filesize

      36KB

    • memory/1628-68-0x00000000002D0000-0x0000000000324000-memory.dmp

      Filesize

      336KB

    • memory/1628-67-0x0000000000400000-0x00000000004DA000-memory.dmp

      Filesize

      872KB

    • memory/1628-46-0x0000000003810000-0x00000000038EA000-memory.dmp

      Filesize

      872KB

    • memory/2388-9-0x0000000000400000-0x0000000000410200-memory.dmp

      Filesize

      64KB

    • memory/2820-80-0x0000000000400000-0x000000000051B000-memory.dmp

      Filesize

      1.1MB

    • memory/2820-81-0x0000000000400000-0x000000000051B000-memory.dmp

      Filesize

      1.1MB

    • memory/2820-88-0x0000000000400000-0x000000000051B000-memory.dmp

      Filesize

      1.1MB

    • memory/2820-66-0x0000000000400000-0x000000000051B000-memory.dmp

      Filesize

      1.1MB

    • memory/2820-61-0x0000000000400000-0x000000000051B000-memory.dmp

      Filesize

      1.1MB

    • memory/2820-59-0x0000000000400000-0x000000000051B000-memory.dmp

      Filesize

      1.1MB

    • memory/2820-57-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB