Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe
-
Size
353KB
-
MD5
ee547d07a66ddee8cd8a89f5c7af17e0
-
SHA1
5fa01bd7b8b42f6c136a771c1323464514359253
-
SHA256
01ee00438aae21b9e5e71585ce24f95f99cd3f47cf8430bec99e590122b7c0e3
-
SHA512
519cfa9ebf588f3311d153d7c887f94991213e78e30d696da1b7b711419e3b3b83963553c923a1bb51728e9238e03373f5a93c85942b8e8ef9458f7e7783919b
-
SSDEEP
6144:VApv2TGV7drbndj93FK+BX2JagZfjhJkiZdkCGrAtDuWhXVf40gPbuykp:VApv2T8Bn3FsthawZGctB9gzyp
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1904-5-0x0000000000400000-0x0000000000520000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1904 set thread context of 2608 1904 ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\paramstr.txt ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71C74151-778B-11EF-9630-523A95B0E536} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433024494" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2608 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2608 1904 ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe 30 PID 1904 wrote to memory of 2608 1904 ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe 30 PID 1904 wrote to memory of 2608 1904 ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe 30 PID 1904 wrote to memory of 2608 1904 ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe 30 PID 1904 wrote to memory of 2608 1904 ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe 30 PID 2608 wrote to memory of 2716 2608 IEXPLORE.EXE 31 PID 2608 wrote to memory of 2716 2608 IEXPLORE.EXE 31 PID 2608 wrote to memory of 2716 2608 IEXPLORE.EXE 31 PID 2608 wrote to memory of 2716 2608 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee547d07a66ddee8cd8a89f5c7af17e0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545241e33438fc1cb6af8063a9cc08eaf
SHA14ad1d0decf2ed9c557dad20897c2fc96208f1553
SHA256675956546596c869eaac0db3352878ef06debf004cca59060a81bf0b307b83c6
SHA51254ccfa554cc11f8b752fe71f597dc206e2b13d0904b8292275ea80f62e518420c409f038fcf77c3e3b2611863e70884bb0d30aa66bb93103c19968e62b837d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550100e5a946690dafe0f889a5a822e50
SHA124dda2e3639fd50a22e659b4fed8c6a30912e7ab
SHA256777974e95d73bbd8442a77fafb5e439cb40495099df5b8e28d11738fe03adcee
SHA5124dc93c230a1ca4946ba038788b464bb56b92aa20fe812c016867463c39259f0e0302a38b9c9f5dd07367eabc41121158aa98d464d338aeecd232b9509d586743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319fbf3d7fc3af5de70d3a1edb75d09e
SHA1ec507762dce35370bb30122e3107b4007daf9a8d
SHA256d4d14adf81009853663edbb0dc7116d45877c163b1bb3515856f63d435eb3ab2
SHA512a45bb01252aad0c6e21fac60ac5fe3d19bbf40a34059f797afb8aba7ce154b9350ad8b0727dd1d5b23b890c31f5f5df593d5592871c1bf59f66ffcbc50a84030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55346bfc1a86f7345f7541768f0027b8f
SHA17603e782ec14a139e3446c1e22ea58d763ffa9af
SHA25637fcf82556504cdead44271cb6a728a552bff6c90785615fad9e0fc53a05fe98
SHA512f0b688e92f6c11b626d14d09c5c0cee3235cc9dcfb0d91335f14a9039905e19ebac7fcee4fd836d01f1e2ebfea0b74299c16187af6cebc019426a878c89e48bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca48935acf6b340aea2eda26aad420a
SHA166e9c11d03c1193c11d8a3c1d64185fbcb77ee89
SHA256b39b311356d30c7812da612dfbf371c65065961ce69604c888bdafb50c935069
SHA5124999f7d980a95d38b7b26bcb955732cb988eb06d0288ed5c2a0ae5bc31544321e49555ffccd1b793291c71331c4b072f89f725d7a72555841d8b0f1ef4e0fcb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c567c130076dff1dbeeb62be34043fa3
SHA1b0180cb528c59e595c9805ca2584e0ac7bfa653d
SHA256528eb7bc1ef25d873b9ec3e59d4ba678958e3e79f8e9c9c9f26b41b109b49528
SHA5125ee54333bbbca98756664b000fc38494ea873246ae42f7c43106b48cf81d9db4a38ba73e0be744c82875e3d4aab5c0ff217d7ea8fe4d94b7a79a292499d1e449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d475b9d70d215aac4babe00413d7a9dc
SHA122477b5c6b7dbdc545846d37684571a0a7c64ed0
SHA256866489c2dcdcbb3e1c3aecbe279c322da33e824be74c5b522400ecd5dbf750b6
SHA512e6ac49e3be5c8140e9befa580a0a1630d54c822888054deaf5e56ab7b158554f08dc941ce8369873c580195c002b3bb07f2fca884382a6be738d78806d14f9e7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b