Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe
-
Size
356KB
-
MD5
f702af072152aa14679b6a7e751206cf
-
SHA1
bea4acd1ccc66411a93515a500c2499117c4574f
-
SHA256
6eb6a4e0c8b47687bb1458e740ec50276b0941560f0fc8624ed26f8a806708e2
-
SHA512
d09b7d350ea359b9258f4801a1c7ac5c19aa40cc5c1a47e22c8f817f02e25f932e40babdc4254c965a5c7c246124d832e2b484d0a0378e7c8112c13f6620a518
-
SSDEEP
6144:FgtbjoS6ziXHgv8SOdyjT67oEFFC02yIJP+0EXhpR2U0jCbThIqnSydZ9Pl0BtSD:FgtbMS6+wv8dzF2DP+VpaCnhIt8hl0KD
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2652-6-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2652-5-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 2200 2652 f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433466485" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88E1CFF1-7B90-11EF-B40C-C6FE053A976A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2200 2652 f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2200 2652 f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2200 2652 f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2200 2652 f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2200 2652 f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe 31 PID 2200 wrote to memory of 2656 2200 IEXPLORE.EXE 32 PID 2200 wrote to memory of 2656 2200 IEXPLORE.EXE 32 PID 2200 wrote to memory of 2656 2200 IEXPLORE.EXE 32 PID 2200 wrote to memory of 2656 2200 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccc662ffd6518c1b6c58dde623e79c8
SHA1a0d237a82d4b67cf736362d1733423df9d364546
SHA25639771bca0a76c4b11aa02f333c053362e3a26d07439fb5d0c13828cf2a566d88
SHA512605d862d477eda4ef98623b96d7a6c446798f4df211f54fc14c5b75d0ef5c6c8a1c5454a677cd01708ad6bacd376ff4b60ad5d92057bb139e1a5667383b48493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caac06933eade96eba1f114925de0246
SHA134b83c5d3b20aa475837c47128525c4b1427ee11
SHA2564cc9f30fc9397a9081844602e8866fde8f8bf0fb9a1339c8336aafc30d1000e8
SHA512ae48c936bcbb9646179a365171dc7e021582da7806cb5118a0179d4d54a31d40ec35d1f26d050dcae2ee60e1013b884d19952872350209dc6b2d9bf11ff69f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd095b1e0afae7aa32d22c8b11018e9
SHA1c228c134ed87afd4a3c283d4f09080a194f4ff7c
SHA25661d29efa58d77f42f39ac8789934dc61387b0311e47cee801ffc5566caf35ac1
SHA512a24b8136878b5467f89039594008a1607bad6bf6a3c1c0ca6eefd104531173e462d5603d52d7f7a1b9a9fd5030b139bf4f7c40ba95cb787ca3b84d9e1218fbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590816926df4280d48892a9abd34d1eca
SHA1852b35c072fe9982570d94e1c3ccf49bfe800096
SHA25638fea2e925951ea6581f22415c80fff310ccfbd7556ea91183c8c8d25c7cc873
SHA512ec3222caa283098cb0a6ba898c86fa030db6fa404170919e1d6d806ffac069439b425c8e0734a0bff95ba7d22300fe2253d2f4ceeb22c42867c4e61ef5a97f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c99df923cb27f67ae783ebdad28e02
SHA1b91a05f14239c3df8ed082576b7c52a599d0de93
SHA25671aced10fdf1efc462598e130fb1ee47a52b32152bc8cb268c842280bd9520a2
SHA51277bcb2968bf1d6dea7fe4ae38a744eab9f8bdcaca40da6343c5a8bb65ca408f75387f49be9ba3511a129b234f2c48843dc77c37636bbb9ac96ce6d78891d7696
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b43bc91ff55acc24709ac67bfd6ec81
SHA1fe43800e5fca93da7be804730ed51e2eba265d23
SHA25674ff3de1989503bcad467f889efe2e487601a9d89bd6b5a510028b41d916d4de
SHA5120a7d058e996615321da5a61e54a5a41a589da082f8db8e5039830853bc53d11b3d51d84db76d5f56adc7388cdd95c1015dc3b7be84989108135d2c7eec10142b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092847f365adc44dec828307087476ce
SHA14f41b24553f753a2cbd73f94a67f9fcaf01d4287
SHA25688fd96a80acf27c21cc789c7f928dbc2748d52ea13b18607fb32978376d36d3c
SHA512e2a8b3b3dc2a1a1ad729039533d5074e38f8cf7f703fe72298ce80a6c6fa3a530b8fdd342c2a885d0ed66769a3511a49bcd7f3e125db00ced34d7b9351c61c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa78835ad762366dbce684e12758559e
SHA131a77df0be7b6654e5f910cec99330c33a2aeffc
SHA2568ff2f863338647310463c3b876702f465c794a3010be772fd70339a8a8df30c2
SHA51213147a26a0509ff541f47360a6cff18b088306882fd1bd4f2c05c9838dc064492c04d1d08155abd12d729e03cf07f2ebd6146270b45823e0cff17440bfe042a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d04cf08eed6c2cdfd7fd158842afd0a0
SHA1a00ac5eaac62acba45980088f1b7a57a63ebe2a1
SHA256c96d9f599de25fc235501626d5b7e6f961d77d708b78cf1c2824056abf249993
SHA51238acb5f46fcf5c1e6ef3e1ed85869c9cb08483799281729657eb26e1d3dc24958ced9cc56a369f125bc4ad489b53e44b43843fe476d3e6487a4c2eac6b91e240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744b716f941135949044f5fbc1c742cd
SHA155d6a9ef45d17124eb4fb3dbd46f03e223262884
SHA25687f565e8d366e656d02aa26927984ba2f0dcdba0d180c14530dae325816974cc
SHA5127abfd9a541ddf6ebd021327b2bf41345a0657e686ab5e74eb1bda6dff371c573d460d2a7308f9a6323bc9e3bd55938a9e62a7afa4fb6e12d9c514ba81002b9c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56836c7acdc9e5c337f03392b748e1426
SHA1999dd08e36e8e077e5b102799799134975416182
SHA25645d9340796627bb3b913146d81c8c6dd5a12a758b35583aeb865a0b79df2b925
SHA5129ff963ead1898326ca86bdec582e49266f84269965b77725dcaf358882d97365ac6bdcb4e022bfeb5825b162b9523a431a7648c4c971d40f659817a68107c5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531ea6a4c008a777fdd8a2df317c7c5ec
SHA13c7ac9e497dad61f6b80bc086a5ae8a514130a09
SHA256f0824f85e1bde9a234309a907d23e3f6cf30c737789d93359e5fe63692a30e2f
SHA512c0a3af8895a34bf5d8c3de1081e82ff7e04671cac4eea0e8958fb7d40d963db35d8c05ee82fcff2d77fe00232adca93fe85b50535f13b25ae6901b1b8a733934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50c78e0ab1a0aa70986b6f46b14b00e
SHA1a6d76d540760964e040c0fc04b297dc18e248604
SHA2561955cfd29ffc24457b438ff79148b7a72d8befebca968f05aefcf025277169b8
SHA512d15367d922db9b59734bd062dc09f4cd8d32fc61a8dae84ce833e1c370d25f4dbad4a7c99429ff83b9d685d2197c8777730c86b55f56cba080f2dba3321e4ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a26ca4f8d03da40a8a026387948daae
SHA16dea31189d057c7bf5d0352192bfb05ca8a9ca5c
SHA256548d33a68fb5c3d397570445acdf5e279bd90712aca75c1741a590b87962fc9c
SHA51235330a55724480054bc9419d3628aa1a30c336a95bfc2879d70f6795bfc60d7135cecf3c01684861332c9c7949369d9f8fae35872519e2b44661aa4a7be8864c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ff73240f2e5ab31e0aabae1748f8a6
SHA181353746c8acd657c81c6c32a19303dd70239cb2
SHA2560ca414035bfef690e43032b2ff3fc2cf9fea935aa3a95daf23e712239d1f809e
SHA512088bdc20b7c03be5cc7e36db02ee9a349a7e7e00b1599a2ae2cf4b308c8626b5e2746065a5f006e97cda0f1861c912fbb60080224eef7651bfd3b309ee44a9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59345393eb224fa0b83b99892890b1137
SHA1190a29878c67d741d8977fc92baf453aa04fa332
SHA256d878799716171d514c96101c5efb71791b00b6d17df9b15e9f26feb2987761cc
SHA5127ca4c70ac5709d21c1c8afdaa322f7c3d9fc228369eea642b35464585b95872b5e6656f1028f308c3bd4fc26fa16c0f2f36da68bea9ad3a250929157fa6c2bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f049a125a4eb810ce09579a78562ddc
SHA1dfddf81f5d34652c992c92e84d81ef1b79e9d294
SHA256c33cc15aaae7e3b0aa112b85224fcf74b438c057470d6933b5459d83a46369b7
SHA512a0d09bff08172dfd98c2072687eb6de0b4c4826d6f565d6d93126cbcb64914d15fe9427ef258d95d7689aa8f648630e983dc003e998f797dfa4f39c0fc20d7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a079b499dc60b7dd4d17b6f6742baff
SHA17dd65d449f2dfae59e692f51d0342cdbfed6e826
SHA256e6c1e6ce033954135f79e247c6918c9e01ea4fad5f0b6755e2bb5e66352e6a6e
SHA512e83d499cc62714509d5367422fcac139f457b00a4c849f82f765700072222e8594c324bd218a96c4aef91753fa181ee7879e936bc59f7df63282f6fffeea4475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aaa0bfff0773a2f318b24810e8f3dd7
SHA120154762e1a9f62b08ad7a49a061f1361d4c3b3d
SHA256fc8025d9fbb830ebe033f4210b395e116558c64df8cd224eb880bb045ed5f71c
SHA5121816d7b8b26d554fd97bd0a9503affdef301ed92c93d3bf609fb4cc8ccbb7af56ab1218a94e0009ee7783bd6059c0976e6abd1b8b06a4b7fb41a103779bc5e48
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b