Analysis

  • max time kernel
    140s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 22:00

General

  • Target

    f495bf78223aae2cf86c7848c0657671_JaffaCakes118.exe

  • Size

    794KB

  • MD5

    f495bf78223aae2cf86c7848c0657671

  • SHA1

    3569fd9c78fe3aa90ec5ee321165370198c66388

  • SHA256

    c969750f7c1ac45d3b7d191637b8794232d4b0b3d40925aacd39743185093b40

  • SHA512

    3e3f60812d22286e64bbbf9d96e9b8de7bcccad894adce3622c76eb7fc66097e1600c7f09b80a638007d8d2155182f5be721870509deb5f2c44ea9c5991b4356

  • SSDEEP

    24576:deTPoV3OKVC2EBRocVQIGxIH0mWPJWJPxojvLoJ7M7wiilQDhjCTcSE/HfiwZ6On:dZ4uFfW6GNwF

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f495bf78223aae2cf86c7848c0657671_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f495bf78223aae2cf86c7848c0657671_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\f495bf78223aae2cf86c7848c0657671_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f495bf78223aae2cf86c7848c0657671_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2732
    • C:\Users\Admin\AppData\Local\Temp\f495bf78223aae2cf86c7848c0657671_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f495bf78223aae2cf86c7848c0657671_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4daf21b4a06c660659ddf39e711ed432

    SHA1

    1a4da4b775ad9bb6d0e02e8edb4e8f4aa9531f8e

    SHA256

    0e65a59cfc3e0dac8434a831caf6e3e0e70253fddce61245043f99e2085213d2

    SHA512

    92f5c0b09285e97635a9bb765d0ce05bb2a1d69a68a0e6f6e1492f09c2044a47980437ee58eba7bab34b579aef199bb1461ccc52a9397a8a31e6226d8a87e0fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3069720d224ca6d8628fddb9080c6cc1

    SHA1

    c4a7f3548a66400598fc7f13589172d7f1f22a7d

    SHA256

    770b7108ca1bb7e79300c2145c871162f24cb0f9cc9213ee6b5ee1e5d82489e4

    SHA512

    231789108dce33b161a3849bb4b8cfaf31aeab887a9507aa976d834d52f5ffd3b54d979632cde4bf43156ee8b61c224180d7eda0c15a894f070b07e59c2bf804

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65eb9ef81d8d6a015190bbcaaccbfed9

    SHA1

    972e62f71d5fed690f327e4055d76d22b31def4e

    SHA256

    36b30ade9206ae63acb73b6e3f15faf20fbf86672d58283df85eafd22ba4b167

    SHA512

    cb3c771ff5f9f8e698ff11514f9962daa794284c9a072fff24e9f95c7b8a46ae6065e36352a68e01e75876f863b8886736ae20fa9ab5b54ab88e307fd3070989

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dddf8b57699ed8f111e589607682a0db

    SHA1

    e6a3b504e1c10ff229916d34db7167607d64ef0f

    SHA256

    0b66795ba89aa5a971c4a2eda2aaef2399ed74840897e3937750cbd3c300d7fb

    SHA512

    e7752baf68dede656953d0312df8197a3086f924d1cfa8e387aa61d1124e0ccfc560357f234db18c01921dec2cd283797c295a450354ba7b0dec8e3d8ca68fc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2c832cdf712e90ef371f7dabf4b7ba3

    SHA1

    61694868d50422bd6a61a43bc1e3d31f9b834ab8

    SHA256

    de76856745bf5e993b354ebdee4630cc703a24921a5e75a4ed231d7bbc6e3685

    SHA512

    05352aa8b640c048ba8394b5064ffc96cb6acdf6b5f2918f77f928717575e1e46f28384ca21b6700fcfe574d4f301ff2b1fd470e83bc11bd3b040ce820d82703

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb745a78e0c2e82d0ecd60b266abf408

    SHA1

    ba56130b8135155070bcc6eae4a120412f183520

    SHA256

    59f8aa562c838ba960f5ce816cbdcfe5e8eb98d8f156b871d2e22e4a88985c01

    SHA512

    d53153dbe5a168a1145b4f408f0f4b8de0a7b9e3681477b3ff10a623780e3d7f6aea504f84627893b0db415924217b1dabfbaaf32edb10c79d748f78ac617fea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6994137d0ac2d25aa8668bd3a2b8bc50

    SHA1

    10a540d59a233cbfd6aaa844b6d9c8f9f7255102

    SHA256

    3aa31c715b3632844769c74d6d732a4c6f9681316030e144a7cc0d7fd4b3716d

    SHA512

    8765c80bc594dc90fb086f17c0627c95dcab764ac7854dbb14ca1fa811dc5888ed6fd4bddf6cf296671720caee1270cb8dd3059ecb9f20922affb191e8660e4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f415ae2bb13f22da095c901831d18f5

    SHA1

    d686336e2e8678a4b57350c15e50bbb29f3253bc

    SHA256

    cb79aa945d4f1f8cd106eb26473992097365cd99a8b31625e0111fddfd213d34

    SHA512

    2f8d4a05b6b5e6f3980773011dafe1a3555f604941781d421e8b0d01b53840874e10dedd5b944e1cc157f9d4f4bf28ed195fd26844d1fae8c6b91fe74d19094a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7873d9f452d920b261b489b8b6208c73

    SHA1

    5bb0c8242fef89f7c9966c2963f45007e16cd7a8

    SHA256

    20901116032f13fd4ab03f31c0a8fcd7ccd640455a7ca459b8171bf5ce3619e6

    SHA512

    db67fd5441b589b4f5f3d203e7e20e98911354b6fb7473682a8e9564e721c33e65b87b45b2fb3066097d193efe49e1764fe6ec0a4da31142bf0d6316c061a416

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7a1cb28d442c1c367219564d129fdd8

    SHA1

    ae18856f3ba15554c65de88d52ee92e40f58e94d

    SHA256

    3a6689aed568bccad4359f8fb4387312a3f0078d6497be4c19f5f41416a06e66

    SHA512

    43b48f5548ce6eb613cd788de0158642f5492071b428a6210a5720bfe1da893a0a7c0831ae9c2344358b168f2f4dc7a366edc7908f8f7acab1cfae5f5c3da3f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0829e0be18986e33d6794bc95a136c9

    SHA1

    b16ebd223b528e72c6f7a63b78f4058fab5105db

    SHA256

    4037ad960fa7fcc2e019234dc57219414c0704506a8fabb6fee9ac136e5b0cab

    SHA512

    2767896cfa61acef394531016b0b1c5b94cd53c240c43d4d01af0a2e9f5b125143a490df54545975d0386f13a558430b5d9349660656231c711f3413634eec91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7dc2396caeb31a42c37f8ba4f9785ed

    SHA1

    2a5e54117f25a2c8baa63d0361f8749ba07eb9e0

    SHA256

    ddf2a36177429c0ebca1c736b46f68e3d574732337fe5ba2444e50a8b62c7389

    SHA512

    cbd6fd69b71c4f5b441b9d10477ea85b6b42312e7e7ea523645adff9d089fa258de16493ad33b1502f3698c98a55d62692d5fa648a9f58ce11ad6dbac7f21737

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa7f8062a5f2a3b9fa1835c9bae75acf

    SHA1

    0618894839a6a069e2a25c26cd6591620fb4b2f6

    SHA256

    269b3895d92a4daee252f708bab93b2d4b7739d4b74c8c469a4e6db94be1cc3d

    SHA512

    6c584cd1bbeca6753c64d1fa4114af66608580ca9c9291d786ff85fdec34185fb6d74eeec1748ec9c2cdcbac6343f1ee0f0cb6602e73576fa1e4a68db9262df5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29208ece7b6bf3aaeac23650713eddb5

    SHA1

    221d9d332ba108c75bf4cc1407a3c4d346ef30b4

    SHA256

    bcf7689655abd55cc692b9e401e13fc69c685572484256dde8199921b24b8f23

    SHA512

    96eb5452abb4aaf2cd75d074d3f6be2c3cfc1edbfc8fd3681f35b86cd494c9da44686439908f2f3f9f3915de5dd654c7af52b04e24baf35350c56a96d34dab92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    072dc972683fd0fc53f1b48406b188a4

    SHA1

    147594d66c0234ab7f192812e09a6c4d7f2437ca

    SHA256

    c1bdde9a72ac8184c795e187cf4b081abd04e3dba5691b8bf91ee07053ae260b

    SHA512

    edd0ea998f601cf0d3d82c9bb040be7672e6209eb070bfa25f7061c040155c1064327f7702d19d5000394b8a2267e82bc32080d6a4bc2d5ed929851d10d31583

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    797a0381877b28591872806c2c584006

    SHA1

    5807708c7cea580bc220feae3cbd5f44b6ecdd4a

    SHA256

    b37bb241cef384f4d6f225cf925330722089b224f5a152a4f4b9167c3c2b340f

    SHA512

    5feb8393936974d06e3d4bbe7e14e26d95d5cde3917d66188d02b1970764b58a6c0beae152f7fe696d7f1d9da0736f7b7f237edcb7cfc43bba1c27f169fcce16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a3d9a6a0e530c7b1b007e5ea0bfdc03

    SHA1

    4a05fb36d9a4d89be2754f04db42b3c3430d8ed0

    SHA256

    c8a70f67a3a1d73c90ca65c198b4905612cf7eb71117d1c9293e34d3b1fba891

    SHA512

    5e6a15b5a635bb10fabc6621a8102e846a18a1782f8b60b047792f493ed8b5dc58c53e6988df459cbdc82e95d5cdfd2b3f6a4fcf238932228c0f53e57cb698bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f61a23caac4799233495392ff124d5eb

    SHA1

    6a6ce182e2a6accdfa1baf32eb0f76e593c751dd

    SHA256

    ee4ebc6d07afc2f32f1fe9006e199722ff59a8818f064c42cc2c6410b9c7a3d6

    SHA512

    2b9cac3e48a99dc12aec1a64d2b29cbf9a2ad7b9ea222449437f59219ae9966a22f2c7b872e68b4ddb3aed5c93cf37df25fb13fa9aac52696f0f42e9500dc841

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a21a0df0336a95ad3a1180de4142b08

    SHA1

    48fb073b2cbe6e9e1b4c4afa36446508fe17dcac

    SHA256

    51f98a11a65646ec4bf06b7d6abe19318724fed7836b3a2daf691b705f239685

    SHA512

    6424278f792b83aa4fcda6d01190855ca8f026f4bc40d4c16db33c1813ab6cb13176109ca349a1a2d32fbed23d0bb1741a6d542ce11d92d7bebeacabb5251752

  • C:\Users\Admin\AppData\Local\Temp\CabFB43.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFBE2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2732-5-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2732-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2732-442-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2736-11-0x0000000000180000-0x000000000024C000-memory.dmp

    Filesize

    816KB

  • memory/2836-13-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2836-10-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/2836-9-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3012-4-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB