Analysis

  • max time kernel
    70s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 02:57

General

  • Target

    f768325a086941606cacad3b96c236a2_JaffaCakes118.exe

  • Size

    885KB

  • MD5

    f768325a086941606cacad3b96c236a2

  • SHA1

    e20cd96eb43f7992887f02302818d7de07aa514c

  • SHA256

    c9b208f99b7b7a2fd3b051a6fde1df4144201bbeb1110cd8f112160eff77b5e6

  • SHA512

    50f488251f097f0aef44e89eefed07fc0c22922ca0391abbb29a6d05a01fb5d5bf968657497feb023c4ccbafb864fe105efc50269c58b29efe451a15fded752b

  • SSDEEP

    24576:NEc//////2lo8s7z8U9FJfhtjFnwKUAhenQCbA7m9U1:ec//////2mn9FJfvjF7hek7sm

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e44fb22cfec7940fad91c9b378af6b44

    SHA1

    8120a38cc342354f51a8dcbaf3e6a7042ec2d518

    SHA256

    3c714253baa5beecf5beab95d5ec8eb02528533a5ebcc9763a128280cd02012f

    SHA512

    e302c6c79f0d03cf4d1537820de8ab2545c216d65c4f0803de63d89840894d126330b2e443af99318d36630380fcc5f4d06be2c100f0789f3b5bd54e0c24cc7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5be7a3a1acbc33218f1230881c9f7842

    SHA1

    83554aef962296cdc722f2d6823e7cdec1b5bb09

    SHA256

    798b9298d33c6082453ca69f876f3a6891211a37fcc8a0a1631a4a5968189ac5

    SHA512

    4fc1799b568fc9b96aab8aaef6bb571bbffb8286d910c55920784e547448aea8faed58cdd66c0140b55c95d9409beb684053b2c7b928e89b63dae65f405fd136

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00585b8fa9064b5e5d1a8c4108da33d0

    SHA1

    da92d4f241030185f7d5c0ca3b2072aa965eee83

    SHA256

    3797628bdc0ca5009ef0a6092dcba31b490e98cc94c99571685a88c3c93deb9f

    SHA512

    5557aebbd4cac5a97c2e220bddb74ccd0a4aacd574bd26f014b507d2df233044587cb688b61b430020eb1394a5bb6b66054d69bc5714bd6d3d4bfe812684c9f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d28bed6c5781e43beb76833af341e29

    SHA1

    5f957a25317e5c60cbb69af12ae51d28d55f7453

    SHA256

    6f462e4febc8e759e7e0935f0cc210ae7e600675e0e1b083ca1f750951c261ad

    SHA512

    8153d68cf619791a13481f3948e91eec2653d140adb7d18a98dc1e131375102f744f89922b4bb35236dbcd0dad9bb815e6dae6a1bfa2ceced8e058d0e153ee35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc8c8747f5f99c56f502b956579a80cb

    SHA1

    284b44cae061e6736faf33e035319e11780ff34e

    SHA256

    d7bd1f8b8cc6045f3577d9a5283727166aa40fca3d7776c641757f0f1597af39

    SHA512

    9e5c44676df07c3ee9a81b3fe67baef67d48d4632da4a7eb5dbfd79c09befea58676498427ee94db12a6ea6823e7fffb1b14bb08162280fb2aaa2875f02424ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b91e3e1ba056444b74c7edc9d94987f

    SHA1

    25974aa24dbf6a7df9583d5aa92cbe97cfada850

    SHA256

    0df82e199a70b82881524616469f64c908690d2b8e3021765b9cd416adfc6469

    SHA512

    965aa2f4cc7e44b8fcedfb4c6ad36c09dccb9a72ac7c88248e404c436aa3cee530a76133c167cbdac7bd0fc7f4b8648f60d92c4671760c86cc621e8b096d0f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7b3ad23eea1a05cc66985bfba45b423

    SHA1

    5c2dd4f6a8add235e4c746c4de093cb5488e81d7

    SHA256

    4b5be60f3e690a09f12703065162e6eed2304d64fb615318bf8df55a5caaf9dd

    SHA512

    71929d94d0c2913bd81ed59874d7eabd8d3d56b3d041d458f99b049197d25ea78c595e01f0b2e64ec40e1d3f7eaed01694093f37a7391eae7557df01249851ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69588b8407f80a63ae78df4ad4cca0f8

    SHA1

    b1485f7f8ec3740367f029010bde4f9d01745bac

    SHA256

    1c4eaba289af9eef3401b5fb7ee9ff2a8a9ff4387cc2648e4c1477bbf7a1ffd8

    SHA512

    bb8659301849eab4e01207fae67a7114fb2a50a8eac84755d2743d6720be5acae91c6df8102992bfb79a8787203c10e581a3b89c6d856039039241496eb0c923

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5801ef21f5cd67a6a1bf18ecb65476b7

    SHA1

    31edf91ebc86ba20a688ba23e09b97b0103f49f1

    SHA256

    30ae621a9d2e5963b9af53ca58353e5eb70b941cb22906c7aff62f4bca2fd2fb

    SHA512

    5c17e1a97cfcadfb151cd9ea7cd0932a7a3e32260dadf8b4c7d6a7d849e0f5a65b31563f79ff00f6368e96731933040f02d0327d5ee9caa8e617ae57edc420ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d68c73a1560ffcadaf668699c53282e

    SHA1

    a5bb0e01395cce2698caf41b013174a487879b12

    SHA256

    d005535deafa91c2cd7a04761a5bfb49c7e3a3089e6254103b9851d30e4faca3

    SHA512

    536d88ee04e1f95f7405ed427d541adcabce490995c216d97fa09f79a32a7a58ad3784af08bef04217e81a19ddd68b8665be504a39e094e87e7f14ef24a6580d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38bbc20a7803de3998cd2d4493d3eac6

    SHA1

    1ecaa56d05646713fb075881f5414447ddc3b542

    SHA256

    0e6ed92ebfb3a4b8c4142253ed5a3e5ca99dd605ef27f78576713a08b8ab9072

    SHA512

    6ffe3cfb3b5268a776cc5710465532f46cae84202f314cf4ac3a20707e98e8ac9a8baddf334c4ce2b8f1da7379dbfccaf68f5ef0a8c4d7fd48bdff84caf4fed8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7d1468259998471d2bd27921e134635

    SHA1

    1686806d160cfaa8100e53c776daee819da9de05

    SHA256

    948eb0ccd0aebc8798df1a02cb088c01460935fc5753de1996e68a93ecd49ed8

    SHA512

    7e244b7ee03570a4df96cd030645ce3d7ca51f7fb24b64a9be9935f20e9bf9d11619c86aa863883cd268c8920fbb9d49af217bf6c5195485bceecfcce6d001ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7313f1c8c8f865aaf5bb658c342150b0

    SHA1

    41a52c62bfefbd4fc3eb9039eb25990e88f98670

    SHA256

    8ef3bb62e1470c626a6fb325bd36b6fea9e9110fa6dfbd9c84b5d01853b42a15

    SHA512

    798ea973bdd238c529a6c8837106cd33c4cb43ec6a81e7301fe16104371f0ab88417d09c661304ac2546278046b16e8cf9ac6468e5a8d81956643837ea873d9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29f85aecf7404126ee56e3afb9897efc

    SHA1

    c693724dcbcca966cf6f9326a36081b52c0c809f

    SHA256

    3df39931702a3c4787b4e2877538a094a3ee7caaaaaef18b3ff58de820effdbd

    SHA512

    ae77a014c550f37887a4784259a67db291cf21c1bdb503d4dffad247fd635c8d271a6d47dd501a4295a395680768b6f42c2aca36f088c76f102913428d6c2010

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4487127d86c0a57c66d00f2dc67eaf8

    SHA1

    25a1b7fec4773a0eaa1c3bd41fc196d21e928e35

    SHA256

    108854bb4ed459ab4bfb3704e7a6ddd3ed5e509ef81a51a0f47419a37f6d484a

    SHA512

    1c6389e8b3c78887693e1dbc2be87b9e1dc6f8a2bf741f6989a6eed3c1bb8a9bfc81f9600247018ec088557a94921798aa19f085728935caefee0c74abb7d7a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3621764c0fd5cb8be8a435c414b3439f

    SHA1

    cb523a2a42189a04d3836c4f6d00f3620e545b0c

    SHA256

    5795adf71cd736130811e8b16bc59868aa8dde1a03ac6895927034600390f47a

    SHA512

    3250a9c1f34f195bfafa1780dc7f2f682861733baf3fc85f7f92599e64c3b580445e62271bdd163b44aa291594a74e2d6bd6ff1c6b0e64f393e96c71fa74e1dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a8dddb6d8f8cea817b2444e5e25cbf0

    SHA1

    9d23f663cdf44c75ca758a7339ea42b6343ebfb3

    SHA256

    1c14becb106df845429027c5cee30c7ddd08201b0ff08d9e87c7c08bcd904ff7

    SHA512

    70c1f165954530adbf90568f8acfff699b70b5a59f52af2382a74033513b5146e37b36f9eaf182b45f52d4af44140399b65394cd8c2c7f8f21ec114c92163b06

  • C:\Users\Admin\AppData\Local\Temp\CabA6EB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA7BA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2000-8-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2000-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2000-3-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2000-6-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2252-2-0x0000000000400000-0x00000000004E3000-memory.dmp

    Filesize

    908KB

  • memory/2356-5-0x00000000001B0000-0x0000000000293000-memory.dmp

    Filesize

    908KB