Analysis

  • max time kernel
    67s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 18:22

General

  • Target

    f43e2a48e2bd38cad76d55208c438fc3_JaffaCakes118.exe

  • Size

    700KB

  • MD5

    f43e2a48e2bd38cad76d55208c438fc3

  • SHA1

    5c6dffa29fb51790825c6621e7d1787685fd6974

  • SHA256

    dd9d705c15294dce20dffb4ecfb37e4c1f3032ef6f6ac48c5434db954a108d30

  • SHA512

    fdd3d9f3c956494e6d96f45cf966b91d25011b74d0825b582b6ca02e6439fcb716131a5e758bfd3412b7e89fddc7acd75bf4ed3353a009de9887a488892986e5

  • SSDEEP

    12288:npSEbxnzYBOc1amTuQd1tRSKXbDdvbeLZ4XGX:npFbFbcPNtMgDdaLZwGX

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f43e2a48e2bd38cad76d55208c438fc3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f43e2a48e2bd38cad76d55208c438fc3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\f43e2a48e2bd38cad76d55208c438fc3_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f43e2a48e2bd38cad76d55208c438fc3_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2260 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21a1e0bb66f9eb6b529478c32d0f04f5

    SHA1

    fffee2ab98b9e824a23db123a8abc003fe8f3cda

    SHA256

    c8fe3b0118c9c0e3ba734df101dd90ea159cf675add0a31dfebbff0cd7df16a9

    SHA512

    17f80ca45d37dadb88d3dd9e5af3bbadd1a171c1161449dcae27fe050f69f86f5e993bad4a04f29b91e63545d8e7bf9beeec7636935c2961cb68e0786e5696f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b5127544139b8ca569e1ceacaf24e98

    SHA1

    d4316f6bf197ae4aad026a9c59ed5b0a73300ef7

    SHA256

    3dbe70b377ce1862f76fbb2f9f371729e82f1ad8d6e5dce5bf4e943ac4778d61

    SHA512

    3b139a8692f1510cd9c6e47916e7787dbb51b2f926b7d25e80d5aa9f6d519109345be35f0a1098d4551051a20254bd271136da444e29886afe401a1b4e5d4604

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    079e28a75e998175d37983fdd838c317

    SHA1

    aa55c5a04063d15cd32be7a8a731f2f2be3b4be8

    SHA256

    eac41824d192369256302161fb72aef84df8846fbd03d74b333261463b54994c

    SHA512

    332bfc063e89f4ffbe45d4538de492808c4821b2654cef3bc36579533ee1b12b78fff2aff2b3680b96d35bec63778fcb5f31c55bf006d3bc2bdb1a85beae24a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    043b979c35acabd29c796a2ba39b4732

    SHA1

    3eb56325e4515f71a897e92c70d3d863ac2902e8

    SHA256

    47118078dada68ccffda3648370b3d6ba4bc2bc847ea7d7ba51c2ba49cc7b0f8

    SHA512

    d61fc10070b32a62bc629021215221c648bd9d646642b90578bf76bb0a6280a24ec3397ac0219909eccbb70462a974c5d8b1b020e112ea9f52eff8a1c7995dd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    711295eb51da5df203b7d960da7e2737

    SHA1

    e45b32054649efed9c72ad1d4cdfbe292dbdf909

    SHA256

    b48e771de6f183693422b967b06702a03bba15617c02802c360798fce4159e4b

    SHA512

    0db6c88ca3668b8cde09e3ee347e8bdb3926364de752f179bde77a7f0f013fa6bb87a6a2319ebcab70510599e295235e555d1d06a32985f2f79a085a35db29cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba2ee5426094484616d6d0a1f8cc93c6

    SHA1

    fc7f6dff2e06055109b5c62911798e19478509d3

    SHA256

    5fa4acda43b4a44b7fc9b52309130bf096cce08b9c1cd0b3affe638cc4a5d75d

    SHA512

    4bf94245545343de4235417c253c3d7f3ab16d8fef24b0a9b2964b56c1757ab5570aa7e2ac4213efb3360f161f7d979944d45238e7d69b0bc2204ebbd1ea5aae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2504439066d953cb0caf76632d8f6478

    SHA1

    55403a5e537207a657286a7ea03b60b3325e0820

    SHA256

    8e10ea074b0e39a4a2f065677de5df562c5efe793be4e712b92bb1b741058f7e

    SHA512

    d3e1d06262114ac5a180e7560114b2982eca13ccec0fd4fdbfde159f3a812fcb9af13fc0602e81f8709b3c8a952aa43628b389eb80e58d5c99153b95f3589ea1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f598f9c3acc9094bc65422e6d19a62d2

    SHA1

    00aeaaab66f0cd71e02a1556c5f179c8914f8ba9

    SHA256

    27b89900d1fc74341eefd91a1590fe8e3e6f296487cd7885302fdf52cfff5d70

    SHA512

    6a014091116bd1980cc0f3bcd6b67de224fbd75d0898ff3636654e82a108608ffb47e3140d0e806d74b8dd57d4e88b3a842dc8bcc7242be550807ffc6b45dada

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d1ca3aaf7c9ecc0158c9d6fc98db89f

    SHA1

    a8494b03d53ed0ba2091f2ec9696e057c9209ada

    SHA256

    db7bb8413b690ac71b6df12808e8df939beb10042f8bc69c7ac0444f285f6572

    SHA512

    d90dd943fe3c1bd726426fe7c8e2dd3338c95ae5ba39ca11ec6499d980f70e8868481a3e7c0b12eb9b2e6c5858fbe7391b5675e5e9c25e2fad8127d20777522a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57d2791d337a190b14e5452e4b6994af

    SHA1

    18e112e382687f42a3612cf1807aa1673faf19e0

    SHA256

    bc232cb3cd5a114e8c3d09f9de2c7d5731ee6b6b3d9e6dd44221829affc27a04

    SHA512

    5415f52b37e93c45f6fb4608188ede770f1a39ec03a45d3923d52eecdfc094269098d411bc904c222916c3cf72be173471628b02943144469f28d9b008ce0f2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf3973b5963bdd1ecc7ba1851560789c

    SHA1

    c76cc0771455ee5fbb903c50157c377075f4b2db

    SHA256

    59c9193f91fb07f124d55ff1dad2c68caf89b3f0352dae73d258943f201453aa

    SHA512

    5062216b01d94b19e7495387f2952580d6b12c8bbf736302ba8c91e9deb19e1853d1eec8f7d404b8c0a4bc9a4672941f32188ddf94d0831890e3abb5093b1c82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef6f94667a32eb967beb7554a8b9f7c4

    SHA1

    f84c44c786a7d1f29acda60541c9cf2ac4458fcb

    SHA256

    31116b06d0535e3ae657eec5e80fc3b5a07b8337e140d86e0bd2c9247cd5df18

    SHA512

    8beb06a4f14b58e9fb54dbf089336b3d5823fbd7fdb27d4e17dccbdfb0cf5fa1de9e68ec2701bb6db471cfeeadb22afbda7f8999f08e8aead41c188e7fceec4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ac7ff2f3c034656f39044041f17b224

    SHA1

    6997321151b20a6c264b3ef83ba0eafee904c8a6

    SHA256

    0c953b720cbd7cb9f69130f0a4107deae1f7cfb2e7d4bc5c6b4a8d8634db3f76

    SHA512

    51bd3c5ad4b89fc7bf0ec96236f2ef7e44b528b69b20ffa3ab0687d705b1cc8a95a012f66c9309f01b785a9cb0e3e306d92a6161c425e8fd50a32539faff9e3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24d0d29f397b5e379a3e93d67c2b67d5

    SHA1

    34ed799940567f0a63b9e1ab56c011f146833f44

    SHA256

    19cd462860a5f917dc8691e33d63908adaec89c479c3b2addd3b3f34ea880de7

    SHA512

    f8fe8b19dacd71aa90d93f8d73ad2b14a2bb0d011502c4e724c224622fc292b5f97316c9e1e885ec3bbe5ead9e5839ca4b244b4a44f2d166b685cbe26be9c2e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b85ddc885e99d03373c84c284cc5e80b

    SHA1

    bbad0852e8721bcd612209b1c30dca18b4504fe0

    SHA256

    48d5c8d52fa1222482d243709e708932899a235576a9dff96102d2492fdff409

    SHA512

    cf141ab2b12eff5f221616ae7b2bd3604464521ecee216ec625cda5906500bb10391448607dd59c4f67a807c7ad593518324fc4613728473fa164c37e3e6f3d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27e7e24a855046e4a70f82339e959f56

    SHA1

    0133bcc4d9ada4798d30e092592ed9fdb18eac5f

    SHA256

    4ef237be92618a02546755d0407792cd997cb6e9fb3d0eda9f0e8a548fc64677

    SHA512

    51f3d148aaba6c7df9c9008d473aaa2d3360df47b01b937948fc8d09de917d235b8df69a707e6eed170e16ccf7522d232da7d244863c208163d413a836d94c7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8c6f4e836f6e6f847ed5cc7cb01626d

    SHA1

    b8f80c8682d047882b76b27c09c63b9dfaecf0d7

    SHA256

    a2eb7d784f85cce395d105cc35fed005702248ab6ce54d0af726fc3e3bd1f046

    SHA512

    4d00247673eadf863ed6e75430ff13ff810c3c7d5b6796e52d162bbb390141997e5b7bbca3e9d1ad8a0cb9462e2762a829aaf35f8ac25abb0f189ec035a8a83b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f86023c0a0c00f667ce9d1b241cb325

    SHA1

    70ad7091af2d531780ac1704b3fd99850d1113c7

    SHA256

    2a19b0ba370987046406deec1dd79323d7ed9ac15ad41e6ba64f280afc099ee1

    SHA512

    3cb00cdc9660eb9f8b5cdcc2ea05abb30d5fc240e83dfdcf3c6922604f7e28a8be0a294902c544c974ffa19d3c33b246c9ae4f459c9658a49b1f6856bfecb3be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d318b8cae9caa671b8775d8d2225fd8

    SHA1

    0da87da15a41e00c7f739985571b70216319b140

    SHA256

    de3d5dafe6a40a6685345a350650439048c5435aff69c17b7ecede10a6156456

    SHA512

    63c2cba8b403f6506bfd18675c8caa24fd57f3f4b1be876ea3fe95e45e21cf24d8c789158f76eb532dbdd578290ea03d136add9b1f1300e540482600b6c4140b

  • C:\Users\Admin\AppData\Local\Temp\CabBE34.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBED3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2076-23-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2076-2-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-7-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-4-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-26-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-22-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-0-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-20-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-10-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-21-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-13-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-15-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2076-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2260-25-0x0000000000170000-0x0000000000226000-memory.dmp

    Filesize

    728KB

  • memory/2300-19-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB