Analysis
-
max time kernel
70s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
f768325a086941606cacad3b96c236a2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f768325a086941606cacad3b96c236a2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f768325a086941606cacad3b96c236a2_JaffaCakes118.exe
-
Size
885KB
-
MD5
f768325a086941606cacad3b96c236a2
-
SHA1
e20cd96eb43f7992887f02302818d7de07aa514c
-
SHA256
c9b208f99b7b7a2fd3b051a6fde1df4144201bbeb1110cd8f112160eff77b5e6
-
SHA512
50f488251f097f0aef44e89eefed07fc0c22922ca0391abbb29a6d05a01fb5d5bf968657497feb023c4ccbafb864fe105efc50269c58b29efe451a15fded752b
-
SSDEEP
24576:NEc//////2lo8s7z8U9FJfhtjFnwKUAhenQCbA7m9U1:ec//////2mn9FJfvjF7hek7sm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2000-3-0x0000000000400000-0x00000000004D1000-memory.dmp modiloader_stage2 behavioral1/memory/2000-6-0x0000000000400000-0x00000000004D1000-memory.dmp modiloader_stage2 behavioral1/memory/2000-8-0x0000000000400000-0x00000000004D1000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2252 set thread context of 2000 2252 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 29 PID 2000 set thread context of 2356 2000 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\2010.txt f768325a086941606cacad3b96c236a2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f768325a086941606cacad3b96c236a2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f768325a086941606cacad3b96c236a2_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433481316" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0FAA2511-7BB3-11EF-9E99-E699F793024F} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2000 2252 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2000 2252 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2000 2252 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2000 2252 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2000 2252 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 29 PID 2252 wrote to memory of 2000 2252 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 29 PID 2000 wrote to memory of 2356 2000 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2356 2000 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2356 2000 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2356 2000 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 30 PID 2000 wrote to memory of 2356 2000 f768325a086941606cacad3b96c236a2_JaffaCakes118.exe 30 PID 2356 wrote to memory of 2724 2356 IEXPLORE.EXE 31 PID 2356 wrote to memory of 2724 2356 IEXPLORE.EXE 31 PID 2356 wrote to memory of 2724 2356 IEXPLORE.EXE 31 PID 2356 wrote to memory of 2724 2356 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f768325a086941606cacad3b96c236a2_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44fb22cfec7940fad91c9b378af6b44
SHA18120a38cc342354f51a8dcbaf3e6a7042ec2d518
SHA2563c714253baa5beecf5beab95d5ec8eb02528533a5ebcc9763a128280cd02012f
SHA512e302c6c79f0d03cf4d1537820de8ab2545c216d65c4f0803de63d89840894d126330b2e443af99318d36630380fcc5f4d06be2c100f0789f3b5bd54e0c24cc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be7a3a1acbc33218f1230881c9f7842
SHA183554aef962296cdc722f2d6823e7cdec1b5bb09
SHA256798b9298d33c6082453ca69f876f3a6891211a37fcc8a0a1631a4a5968189ac5
SHA5124fc1799b568fc9b96aab8aaef6bb571bbffb8286d910c55920784e547448aea8faed58cdd66c0140b55c95d9409beb684053b2c7b928e89b63dae65f405fd136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500585b8fa9064b5e5d1a8c4108da33d0
SHA1da92d4f241030185f7d5c0ca3b2072aa965eee83
SHA2563797628bdc0ca5009ef0a6092dcba31b490e98cc94c99571685a88c3c93deb9f
SHA5125557aebbd4cac5a97c2e220bddb74ccd0a4aacd574bd26f014b507d2df233044587cb688b61b430020eb1394a5bb6b66054d69bc5714bd6d3d4bfe812684c9f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d28bed6c5781e43beb76833af341e29
SHA15f957a25317e5c60cbb69af12ae51d28d55f7453
SHA2566f462e4febc8e759e7e0935f0cc210ae7e600675e0e1b083ca1f750951c261ad
SHA5128153d68cf619791a13481f3948e91eec2653d140adb7d18a98dc1e131375102f744f89922b4bb35236dbcd0dad9bb815e6dae6a1bfa2ceced8e058d0e153ee35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc8c8747f5f99c56f502b956579a80cb
SHA1284b44cae061e6736faf33e035319e11780ff34e
SHA256d7bd1f8b8cc6045f3577d9a5283727166aa40fca3d7776c641757f0f1597af39
SHA5129e5c44676df07c3ee9a81b3fe67baef67d48d4632da4a7eb5dbfd79c09befea58676498427ee94db12a6ea6823e7fffb1b14bb08162280fb2aaa2875f02424ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b91e3e1ba056444b74c7edc9d94987f
SHA125974aa24dbf6a7df9583d5aa92cbe97cfada850
SHA2560df82e199a70b82881524616469f64c908690d2b8e3021765b9cd416adfc6469
SHA512965aa2f4cc7e44b8fcedfb4c6ad36c09dccb9a72ac7c88248e404c436aa3cee530a76133c167cbdac7bd0fc7f4b8648f60d92c4671760c86cc621e8b096d0f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b3ad23eea1a05cc66985bfba45b423
SHA15c2dd4f6a8add235e4c746c4de093cb5488e81d7
SHA2564b5be60f3e690a09f12703065162e6eed2304d64fb615318bf8df55a5caaf9dd
SHA51271929d94d0c2913bd81ed59874d7eabd8d3d56b3d041d458f99b049197d25ea78c595e01f0b2e64ec40e1d3f7eaed01694093f37a7391eae7557df01249851ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569588b8407f80a63ae78df4ad4cca0f8
SHA1b1485f7f8ec3740367f029010bde4f9d01745bac
SHA2561c4eaba289af9eef3401b5fb7ee9ff2a8a9ff4387cc2648e4c1477bbf7a1ffd8
SHA512bb8659301849eab4e01207fae67a7114fb2a50a8eac84755d2743d6720be5acae91c6df8102992bfb79a8787203c10e581a3b89c6d856039039241496eb0c923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55801ef21f5cd67a6a1bf18ecb65476b7
SHA131edf91ebc86ba20a688ba23e09b97b0103f49f1
SHA25630ae621a9d2e5963b9af53ca58353e5eb70b941cb22906c7aff62f4bca2fd2fb
SHA5125c17e1a97cfcadfb151cd9ea7cd0932a7a3e32260dadf8b4c7d6a7d849e0f5a65b31563f79ff00f6368e96731933040f02d0327d5ee9caa8e617ae57edc420ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d68c73a1560ffcadaf668699c53282e
SHA1a5bb0e01395cce2698caf41b013174a487879b12
SHA256d005535deafa91c2cd7a04761a5bfb49c7e3a3089e6254103b9851d30e4faca3
SHA512536d88ee04e1f95f7405ed427d541adcabce490995c216d97fa09f79a32a7a58ad3784af08bef04217e81a19ddd68b8665be504a39e094e87e7f14ef24a6580d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538bbc20a7803de3998cd2d4493d3eac6
SHA11ecaa56d05646713fb075881f5414447ddc3b542
SHA2560e6ed92ebfb3a4b8c4142253ed5a3e5ca99dd605ef27f78576713a08b8ab9072
SHA5126ffe3cfb3b5268a776cc5710465532f46cae84202f314cf4ac3a20707e98e8ac9a8baddf334c4ce2b8f1da7379dbfccaf68f5ef0a8c4d7fd48bdff84caf4fed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7d1468259998471d2bd27921e134635
SHA11686806d160cfaa8100e53c776daee819da9de05
SHA256948eb0ccd0aebc8798df1a02cb088c01460935fc5753de1996e68a93ecd49ed8
SHA5127e244b7ee03570a4df96cd030645ce3d7ca51f7fb24b64a9be9935f20e9bf9d11619c86aa863883cd268c8920fbb9d49af217bf6c5195485bceecfcce6d001ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57313f1c8c8f865aaf5bb658c342150b0
SHA141a52c62bfefbd4fc3eb9039eb25990e88f98670
SHA2568ef3bb62e1470c626a6fb325bd36b6fea9e9110fa6dfbd9c84b5d01853b42a15
SHA512798ea973bdd238c529a6c8837106cd33c4cb43ec6a81e7301fe16104371f0ab88417d09c661304ac2546278046b16e8cf9ac6468e5a8d81956643837ea873d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f85aecf7404126ee56e3afb9897efc
SHA1c693724dcbcca966cf6f9326a36081b52c0c809f
SHA2563df39931702a3c4787b4e2877538a094a3ee7caaaaaef18b3ff58de820effdbd
SHA512ae77a014c550f37887a4784259a67db291cf21c1bdb503d4dffad247fd635c8d271a6d47dd501a4295a395680768b6f42c2aca36f088c76f102913428d6c2010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4487127d86c0a57c66d00f2dc67eaf8
SHA125a1b7fec4773a0eaa1c3bd41fc196d21e928e35
SHA256108854bb4ed459ab4bfb3704e7a6ddd3ed5e509ef81a51a0f47419a37f6d484a
SHA5121c6389e8b3c78887693e1dbc2be87b9e1dc6f8a2bf741f6989a6eed3c1bb8a9bfc81f9600247018ec088557a94921798aa19f085728935caefee0c74abb7d7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53621764c0fd5cb8be8a435c414b3439f
SHA1cb523a2a42189a04d3836c4f6d00f3620e545b0c
SHA2565795adf71cd736130811e8b16bc59868aa8dde1a03ac6895927034600390f47a
SHA5123250a9c1f34f195bfafa1780dc7f2f682861733baf3fc85f7f92599e64c3b580445e62271bdd163b44aa291594a74e2d6bd6ff1c6b0e64f393e96c71fa74e1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a8dddb6d8f8cea817b2444e5e25cbf0
SHA19d23f663cdf44c75ca758a7339ea42b6343ebfb3
SHA2561c14becb106df845429027c5cee30c7ddd08201b0ff08d9e87c7c08bcd904ff7
SHA51270c1f165954530adbf90568f8acfff699b70b5a59f52af2382a74033513b5146e37b36f9eaf182b45f52d4af44140399b65394cd8c2c7f8f21ec114c92163b06
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b