Analysis

  • max time kernel
    120s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 16:34

General

  • Target

    ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe

  • Size

    684KB

  • MD5

    ebbeae80ae54f109544264b22bbed2e4

  • SHA1

    5aec8d76cdb751d54c02e7ed0905f9bdeed850b0

  • SHA256

    9bda2334e6a67963fafbd7d1c6400ba813e2a6b7a847b8930f7519c86575aee1

  • SHA512

    ed423202070440f631ba59bc16ab374076717f0237e8c9b990f1924201ee5004b2bd0f3ed90f0aa192874e47a610142862503fa107ac6940ba4097769d32fd11

  • SSDEEP

    12288:I2KuWpy+4kIxmE9zZDXLDQh6tO+1f9OrlF3Z4mxxv0MHoTAFbHx:W7pr4kXwXLjtOAf9OrlQmXvK8x

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebbeae80ae54f109544264b22bbed2e4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    559ef94d0375f362d01299d2f3553ed9

    SHA1

    61eb9005dce4af593f73bfb40c61446f701f8114

    SHA256

    bfa89eda8d10743150a38f01eeb7b3721ef29c97b881728e2f69894089a7277f

    SHA512

    75eb6bc8ec7f78fc2ad219f6718fa9aed7935e1c5f6cb8007effb383bc901e625d9c16b232271c48b7360d6b593076021e53e3e73d24a6c5e6adb0572ade7228

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a01eab5b0217d32a12052625b7a82e07

    SHA1

    b341695fbe035836d31b2027cf18ead331da7628

    SHA256

    6e26687fbdd3453ebbb8ce24a11a2561f400eb20995c96db4a0315c66377d502

    SHA512

    84e9164a9a6b352f6b02b17adf7869cdfb558e4d679eca51a3e4255da3ae73bed7c940120c30b870b35104fffb3e951003481a04869ec1b38f4c9fd5d3bf2317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8dbf6e812b77d18f53854e971ff5854e

    SHA1

    6587d7848792ba4cf4347c758bda72bc933db161

    SHA256

    b3a9a711ee1f0887a3d72843beff449fdb4bc958b115301f0bdd8cfea5fd05ea

    SHA512

    31fb2b3ea90e1b7c9704b568dc5b0a3413e3a1311d2c90a55480cbf9584a10e39dc366d1fe7395f039e4082919ea16a7b8a108a822078a2c2d366124423c4d97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acfa36c96c0e63e98236692c9053d231

    SHA1

    722f9d9f1b49370c2d6cbb0fb323cbeb1c2099a4

    SHA256

    7fb3cbad0ff113b7eb49e0de85331716fa4dc17b64475f50850fddd05bd8a5d0

    SHA512

    cf26f65a5a320e60adf7335440a3680d00c416ae918f46e4601ea311c52591de8f1c09617df6c128e252caa283896f037ebdd2c54442e18f92a226c329b3c0cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e2e7745f4e034ff7e2fc80caad8305b

    SHA1

    c885b229585768e8fc24fda719037d34dbb16f35

    SHA256

    c6fb2e3455ac2449c75b16d0bb84b929b6dcf51ca9bc98a10054ef7b02706bd9

    SHA512

    a2925465ec5ede9819fcafe45d60004915bd7670f8f0d66d3e4411ded023149ad09499f62b5b8eba543e1efc2788bf47bf02df71db4f90a1b83a534d47fa3c6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c96c82d7e22a0ca5c8e515aa21f2b41

    SHA1

    110471c4b3644ece5f996660c2f65c54983c3c97

    SHA256

    6b459e22cea568f2177bfb09fc49d231252c4f649c8d2443d21bd60fb58e9565

    SHA512

    0ace902d5ba2e96142774c27de01088b9eff9e61655e48d01b199955193407a53e9e5cff61024198f01ade2f8352ca0d32b31f82b03da193104c03698c1c8449

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eace823f6795ad8f59fb652e1660e6f1

    SHA1

    d6abe112b1e8380fa026a65634da35f86d4eb27c

    SHA256

    04e56ac86024523e63243dd277e6f025688ec488bcd788d000d99b21c762dcd9

    SHA512

    e9d6b77308396e7c942e74549b86fed0402714fc1172129631b8010742c50c853d5a9dae70fcb2df5b52c9c9dfecd4751c1e0d1020b77a59548f04bc1326b921

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59f051a1710f76de59947bd87f59e597

    SHA1

    c78c5881af32e755a5d0126f0402046c54bc72f3

    SHA256

    6dcb19138ad79108ad759f800c3f448d261f9e64aa0a952945c506b0781ca29e

    SHA512

    de92f2e0d9a39e80444b7589054385f387817d364001e9fa3243a8bc3644b6e3917bac46f4304e8ad5a70b5107d0c736262e432b9f54646ce86c74592de5546d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4187555682256583a3e52427b665e0ed

    SHA1

    d32b9c71095ba38c8a8a0fdb22c5269dce12f2d1

    SHA256

    3fd973ad1caea853a73e5116420f1d551e890f15ae0cd38a3e4ef436f52723f3

    SHA512

    54604609a13785746c3239b10eb9ac111a8ca26a4dd62b74381288bceb898a0ea5da97bd65b0a633c21363ebe81397cc1f9e89d47bc57190ac32bbe23ca3cef1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    842de4b45222f1dde9e859128796b03e

    SHA1

    dbe96e98e9d0e050033b3537e0a9fa5350b58268

    SHA256

    ed5e426fc0991815fffdc76e0de9ad9cbdf8d8a0a9de385a320532290151859e

    SHA512

    351b7c19aa47e601d29cdbac0e97dbfce03afefd0128675fe7e2e8d290edd1932a7ef697d5d04c4c64acfc34001dec6ce7a58c5c8bdbec0bf13eb10b092c63dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffc8bd8d0de71d08bd7d19c945554c8b

    SHA1

    0025c86aa9b6a985d7cbef9a70bbe4001c13021c

    SHA256

    ff100929ccaccda0b56751d3f5c1cc6d91a486dac13b34ade9762e715d01176b

    SHA512

    412ed2084f1056f99155de5194a53a13fb79a05154967cbf5a56e7b973bb2e12002138621b0769efeec6e24a51482455e42cca10da7eff1b669303cf601e9116

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad06d8a83e7f1931af09c81e4fefa26d

    SHA1

    873b2db6df3aab68038f9bbf10cca5f751e2eafe

    SHA256

    4ad6db96fadb37b04832b82cfe77936879be21dee37cb27abc15de9caa4d4512

    SHA512

    ec21bcfafd7c59447e097e0af1d1e197c30f9a5a4f2f325f59a2b6b429e05818b664f8e18d9c67514227687889ab025bc5b0700dfbdf02a65ff28b8fbd179314

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbab14847bd43a58933c9b6c2c987465

    SHA1

    3786fcf52898135e6f9f2be32ae61109d2018a2d

    SHA256

    2ac94659bb0c010cd11615065d801f826eb174155a7ea2435a7abd178ecd5157

    SHA512

    477e764b507281720c677b5a447fc0ffe71a6801bd06948cee6a868466fe2ef1f7878162d321bca28409fa89b666d15f5b8a82cd649962b1736c0f1a6d960f92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8cc56d37e433e0ae4e54d4725a264c6

    SHA1

    eb11ffc66eff3a5122d5ffbe898c2c59d6d40468

    SHA256

    92af5f8ec3a89d0c8082b4d130919a5e96f8a94663a02d408770aac209d2cd85

    SHA512

    6c296a1fe36770f164fe4465f137a422e6e3b19d42e8e5968ba83e7e6eba25bbfce050aeb7c10459c4caa37826ec1a16c3a008a14694e9dc1a52bc5f20280d64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d4f8c2a61ed47b6f2fbd01dad3231a4

    SHA1

    f9584eed58a15277f8d8739584cb6d748452070b

    SHA256

    8011013d15a4d2bbcea07217a10e7c719e964c66f14b391891f92d510a6add05

    SHA512

    b8c1771d1192615015e002e79fff1167bda504bef9c3675fd7491c6ed5baa2470046b6142e2c9dfb52a7174b84e838fd9331813abb1fb503e9706e988e835d83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    154022c0e2878c325d13264020f27b0e

    SHA1

    de87979d746d4397924dd7eb3733d9cfe6e75a99

    SHA256

    cbcb7051c11fde2478c0a9762ffcf55bc8ad4bd191c0a125b7a48ad4bdce8783

    SHA512

    cf369100b12ecc56408a435b334ac50eab4c5403842667919be998605e7591b48d3dcac0a89d7451ffe00f1737482f8f4c44224784324139fc15c7da1829b59c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    070cf16322b3ed7687ab7efc4ed4330c

    SHA1

    f24516238d58ee3c6f912736d900426011f8d4c5

    SHA256

    ae6f94049b4ac708e0681fd042a2f10c8841582af3195b46bbe1dd7970630252

    SHA512

    fb7d86ac601bcfaa1e9b8d2073d25850773a89ac40775f3646cc30524f8bf775cad4f4716b2ef110b536cca10a54fc55f735901f2b27b5f28d4b676145a714c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    000b691d1f2a992102410761e2b4289a

    SHA1

    91c4fc0829f157551bfaa985a6e4f6d2468d1edf

    SHA256

    8b942a16b1580d2071353fde76efe0d70b028b65d9e2e25cdf9a6434874e3390

    SHA512

    30a625c01baf8d64b3ee2f3a598cb70318c28bb9c96abdc45a607cb9847a48c9d7d86e90b2853302652290224ebe2a012116ca223eee95b22dd1b9c2581e092f

  • C:\Users\Admin\AppData\Local\Temp\CabE487.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE4F8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe

    Filesize

    749KB

    MD5

    eda75e8b1355c8c8f7dc1073e36aecbd

    SHA1

    2a3021591d35bbc95a32a4ab1e194ae0deda4322

    SHA256

    a5e03f4fb9554cefb8756fe1d66e02b8a0d9e06af6d947efc4277dbb3939b4a6

    SHA512

    212c5c309f7f8a9ef7bbfcad3ea1f4c099146e6af3372d059ccf03e048c37d6a76d1ae6013a5f0cf1f32babdd92ea988f07fee4b1f57db7423ad6d56f4d92a0a

  • memory/2060-63-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2136-15-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-44-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-40-0x00000000003D0000-0x0000000000424000-memory.dmp

    Filesize

    336KB

  • memory/2136-39-0x0000000000470000-0x0000000000471000-memory.dmp

    Filesize

    4KB

  • memory/2136-38-0x0000000000500000-0x0000000000501000-memory.dmp

    Filesize

    4KB

  • memory/2136-37-0x0000000001000000-0x000000000110E000-memory.dmp

    Filesize

    1.1MB

  • memory/2136-36-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-35-0x0000000000D80000-0x0000000000D81000-memory.dmp

    Filesize

    4KB

  • memory/2136-34-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/2136-33-0x0000000000D20000-0x0000000000D21000-memory.dmp

    Filesize

    4KB

  • memory/2136-32-0x0000000000D30000-0x0000000000D31000-memory.dmp

    Filesize

    4KB

  • memory/2136-31-0x0000000000D50000-0x0000000000D51000-memory.dmp

    Filesize

    4KB

  • memory/2136-30-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/2136-29-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-28-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB

  • memory/2136-27-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB

  • memory/2136-26-0x0000000000450000-0x0000000000451000-memory.dmp

    Filesize

    4KB

  • memory/2136-25-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/2136-24-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/2136-23-0x0000000000480000-0x0000000000481000-memory.dmp

    Filesize

    4KB

  • memory/2136-42-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-50-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-49-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-48-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-47-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-46-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-45-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-41-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-43-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-22-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/2136-1-0x00000000003D0000-0x0000000000424000-memory.dmp

    Filesize

    336KB

  • memory/2136-13-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-66-0x00000000003D0000-0x0000000000424000-memory.dmp

    Filesize

    336KB

  • memory/2136-65-0x0000000001000000-0x000000000110E000-memory.dmp

    Filesize

    1.1MB

  • memory/2136-14-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-0-0x0000000001000000-0x000000000110E000-memory.dmp

    Filesize

    1.1MB

  • memory/2136-16-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-17-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-18-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-19-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-20-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2136-21-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-12-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-10-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-11-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/2136-2-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2136-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2136-4-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2136-5-0x0000000000190000-0x0000000000191000-memory.dmp

    Filesize

    4KB

  • memory/2136-6-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2136-8-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2136-9-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2136-7-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2864-62-0x0000000000160000-0x0000000000224000-memory.dmp

    Filesize

    784KB