Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 22:50

General

  • Target

    f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe

  • Size

    356KB

  • MD5

    f702af072152aa14679b6a7e751206cf

  • SHA1

    bea4acd1ccc66411a93515a500c2499117c4574f

  • SHA256

    6eb6a4e0c8b47687bb1458e740ec50276b0941560f0fc8624ed26f8a806708e2

  • SHA512

    d09b7d350ea359b9258f4801a1c7ac5c19aa40cc5c1a47e22c8f817f02e25f932e40babdc4254c965a5c7c246124d832e2b484d0a0378e7c8112c13f6620a518

  • SSDEEP

    6144:FgtbjoS6ziXHgv8SOdyjT67oEFFC02yIJP+0EXhpR2U0jCbThIqnSydZ9Pl0BtSD:FgtbMS6+wv8dzF2DP+VpaCnhIt8hl0KD

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f702af072152aa14679b6a7e751206cf_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ccc662ffd6518c1b6c58dde623e79c8

    SHA1

    a0d237a82d4b67cf736362d1733423df9d364546

    SHA256

    39771bca0a76c4b11aa02f333c053362e3a26d07439fb5d0c13828cf2a566d88

    SHA512

    605d862d477eda4ef98623b96d7a6c446798f4df211f54fc14c5b75d0ef5c6c8a1c5454a677cd01708ad6bacd376ff4b60ad5d92057bb139e1a5667383b48493

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caac06933eade96eba1f114925de0246

    SHA1

    34b83c5d3b20aa475837c47128525c4b1427ee11

    SHA256

    4cc9f30fc9397a9081844602e8866fde8f8bf0fb9a1339c8336aafc30d1000e8

    SHA512

    ae48c936bcbb9646179a365171dc7e021582da7806cb5118a0179d4d54a31d40ec35d1f26d050dcae2ee60e1013b884d19952872350209dc6b2d9bf11ff69f7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bd095b1e0afae7aa32d22c8b11018e9

    SHA1

    c228c134ed87afd4a3c283d4f09080a194f4ff7c

    SHA256

    61d29efa58d77f42f39ac8789934dc61387b0311e47cee801ffc5566caf35ac1

    SHA512

    a24b8136878b5467f89039594008a1607bad6bf6a3c1c0ca6eefd104531173e462d5603d52d7f7a1b9a9fd5030b139bf4f7c40ba95cb787ca3b84d9e1218fbba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90816926df4280d48892a9abd34d1eca

    SHA1

    852b35c072fe9982570d94e1c3ccf49bfe800096

    SHA256

    38fea2e925951ea6581f22415c80fff310ccfbd7556ea91183c8c8d25c7cc873

    SHA512

    ec3222caa283098cb0a6ba898c86fa030db6fa404170919e1d6d806ffac069439b425c8e0734a0bff95ba7d22300fe2253d2f4ceeb22c42867c4e61ef5a97f48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45c99df923cb27f67ae783ebdad28e02

    SHA1

    b91a05f14239c3df8ed082576b7c52a599d0de93

    SHA256

    71aced10fdf1efc462598e130fb1ee47a52b32152bc8cb268c842280bd9520a2

    SHA512

    77bcb2968bf1d6dea7fe4ae38a744eab9f8bdcaca40da6343c5a8bb65ca408f75387f49be9ba3511a129b234f2c48843dc77c37636bbb9ac96ce6d78891d7696

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b43bc91ff55acc24709ac67bfd6ec81

    SHA1

    fe43800e5fca93da7be804730ed51e2eba265d23

    SHA256

    74ff3de1989503bcad467f889efe2e487601a9d89bd6b5a510028b41d916d4de

    SHA512

    0a7d058e996615321da5a61e54a5a41a589da082f8db8e5039830853bc53d11b3d51d84db76d5f56adc7388cdd95c1015dc3b7be84989108135d2c7eec10142b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    092847f365adc44dec828307087476ce

    SHA1

    4f41b24553f753a2cbd73f94a67f9fcaf01d4287

    SHA256

    88fd96a80acf27c21cc789c7f928dbc2748d52ea13b18607fb32978376d36d3c

    SHA512

    e2a8b3b3dc2a1a1ad729039533d5074e38f8cf7f703fe72298ce80a6c6fa3a530b8fdd342c2a885d0ed66769a3511a49bcd7f3e125db00ced34d7b9351c61c9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa78835ad762366dbce684e12758559e

    SHA1

    31a77df0be7b6654e5f910cec99330c33a2aeffc

    SHA256

    8ff2f863338647310463c3b876702f465c794a3010be772fd70339a8a8df30c2

    SHA512

    13147a26a0509ff541f47360a6cff18b088306882fd1bd4f2c05c9838dc064492c04d1d08155abd12d729e03cf07f2ebd6146270b45823e0cff17440bfe042a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d04cf08eed6c2cdfd7fd158842afd0a0

    SHA1

    a00ac5eaac62acba45980088f1b7a57a63ebe2a1

    SHA256

    c96d9f599de25fc235501626d5b7e6f961d77d708b78cf1c2824056abf249993

    SHA512

    38acb5f46fcf5c1e6ef3e1ed85869c9cb08483799281729657eb26e1d3dc24958ced9cc56a369f125bc4ad489b53e44b43843fe476d3e6487a4c2eac6b91e240

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    744b716f941135949044f5fbc1c742cd

    SHA1

    55d6a9ef45d17124eb4fb3dbd46f03e223262884

    SHA256

    87f565e8d366e656d02aa26927984ba2f0dcdba0d180c14530dae325816974cc

    SHA512

    7abfd9a541ddf6ebd021327b2bf41345a0657e686ab5e74eb1bda6dff371c573d460d2a7308f9a6323bc9e3bd55938a9e62a7afa4fb6e12d9c514ba81002b9c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6836c7acdc9e5c337f03392b748e1426

    SHA1

    999dd08e36e8e077e5b102799799134975416182

    SHA256

    45d9340796627bb3b913146d81c8c6dd5a12a758b35583aeb865a0b79df2b925

    SHA512

    9ff963ead1898326ca86bdec582e49266f84269965b77725dcaf358882d97365ac6bdcb4e022bfeb5825b162b9523a431a7648c4c971d40f659817a68107c5ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31ea6a4c008a777fdd8a2df317c7c5ec

    SHA1

    3c7ac9e497dad61f6b80bc086a5ae8a514130a09

    SHA256

    f0824f85e1bde9a234309a907d23e3f6cf30c737789d93359e5fe63692a30e2f

    SHA512

    c0a3af8895a34bf5d8c3de1081e82ff7e04671cac4eea0e8958fb7d40d963db35d8c05ee82fcff2d77fe00232adca93fe85b50535f13b25ae6901b1b8a733934

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d50c78e0ab1a0aa70986b6f46b14b00e

    SHA1

    a6d76d540760964e040c0fc04b297dc18e248604

    SHA256

    1955cfd29ffc24457b438ff79148b7a72d8befebca968f05aefcf025277169b8

    SHA512

    d15367d922db9b59734bd062dc09f4cd8d32fc61a8dae84ce833e1c370d25f4dbad4a7c99429ff83b9d685d2197c8777730c86b55f56cba080f2dba3321e4ea1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a26ca4f8d03da40a8a026387948daae

    SHA1

    6dea31189d057c7bf5d0352192bfb05ca8a9ca5c

    SHA256

    548d33a68fb5c3d397570445acdf5e279bd90712aca75c1741a590b87962fc9c

    SHA512

    35330a55724480054bc9419d3628aa1a30c336a95bfc2879d70f6795bfc60d7135cecf3c01684861332c9c7949369d9f8fae35872519e2b44661aa4a7be8864c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48ff73240f2e5ab31e0aabae1748f8a6

    SHA1

    81353746c8acd657c81c6c32a19303dd70239cb2

    SHA256

    0ca414035bfef690e43032b2ff3fc2cf9fea935aa3a95daf23e712239d1f809e

    SHA512

    088bdc20b7c03be5cc7e36db02ee9a349a7e7e00b1599a2ae2cf4b308c8626b5e2746065a5f006e97cda0f1861c912fbb60080224eef7651bfd3b309ee44a9f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9345393eb224fa0b83b99892890b1137

    SHA1

    190a29878c67d741d8977fc92baf453aa04fa332

    SHA256

    d878799716171d514c96101c5efb71791b00b6d17df9b15e9f26feb2987761cc

    SHA512

    7ca4c70ac5709d21c1c8afdaa322f7c3d9fc228369eea642b35464585b95872b5e6656f1028f308c3bd4fc26fa16c0f2f36da68bea9ad3a250929157fa6c2bde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f049a125a4eb810ce09579a78562ddc

    SHA1

    dfddf81f5d34652c992c92e84d81ef1b79e9d294

    SHA256

    c33cc15aaae7e3b0aa112b85224fcf74b438c057470d6933b5459d83a46369b7

    SHA512

    a0d09bff08172dfd98c2072687eb6de0b4c4826d6f565d6d93126cbcb64914d15fe9427ef258d95d7689aa8f648630e983dc003e998f797dfa4f39c0fc20d7ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a079b499dc60b7dd4d17b6f6742baff

    SHA1

    7dd65d449f2dfae59e692f51d0342cdbfed6e826

    SHA256

    e6c1e6ce033954135f79e247c6918c9e01ea4fad5f0b6755e2bb5e66352e6a6e

    SHA512

    e83d499cc62714509d5367422fcac139f457b00a4c849f82f765700072222e8594c324bd218a96c4aef91753fa181ee7879e936bc59f7df63282f6fffeea4475

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6aaa0bfff0773a2f318b24810e8f3dd7

    SHA1

    20154762e1a9f62b08ad7a49a061f1361d4c3b3d

    SHA256

    fc8025d9fbb830ebe033f4210b395e116558c64df8cd224eb880bb045ed5f71c

    SHA512

    1816d7b8b26d554fd97bd0a9503affdef301ed92c93d3bf609fb4cc8ccbb7af56ab1218a94e0009ee7783bd6059c0976e6abd1b8b06a4b7fb41a103779bc5e48

  • C:\Users\Admin\AppData\Local\Temp\CabC63.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCC3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2200-3-0x00000000001B0000-0x0000000000273000-memory.dmp

    Filesize

    780KB

  • memory/2652-5-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2652-0-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2652-1-0x00000000004BE000-0x00000000004BF000-memory.dmp

    Filesize

    4KB

  • memory/2652-6-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB