Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 11:01

General

  • Target

    f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe

  • Size

    481KB

  • MD5

    f83a0b168d32e4d40f59bfc25e0bb63a

  • SHA1

    7edd040701b90f04bb53f8d38289c7e3fce6f0a5

  • SHA256

    413be11693ba6eb58843857651f02d19eed8d47381de480898e4bf54ab809d36

  • SHA512

    d6fbfc6b8272b76add40c8bb8183e1308c9880d99a6f5e00aa7dc865e4aff7e7331d3718f55c305aa25b1f3a7672fbc962fabf863e5769b6a2c9f6d1c22bd605

  • SSDEEP

    12288:VX2Snj9WrvJzb9tLimxAbiyvuQ2zGuUKQCtO8bu:l2Snj9iv1b9tLPAba6uQoOeu

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c78709d584ac421395d630d3056b383c

    SHA1

    d2977dfbfe68a5782a7a270b045dc9ade05be112

    SHA256

    89d672770c7567bce0a60c8bfc58cba3628ee3a9c5cea4ffb882d23769025cb9

    SHA512

    d4c5728dd748dc9acc15a45647f268b6f0bac0cdde91496f7f71e95bf503f686322a79c8797de90b20781fc582fb2d2c599df28ae66efa39f6a301151db693ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    313fd0876005a2e096910db87c8bd677

    SHA1

    6b9165a08fb3da321ccec9c05b65d9ba8aee2865

    SHA256

    0ec34615791bde855d7015c602bb1c2355f4da1fdc46bc9c059e957ccb50681a

    SHA512

    5064241a1c2bb09c644c68ace308f13767803ab31b6163a54fa8ea5776f43c872e000550ecd9e25ebe49c524e79e0a0fd8698094535c7bcb87cba8a94db1d734

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ab02453d2f21d2d6a4d3962f350ff7d

    SHA1

    f2908d4614bfa3c3c0e9dd4c5f79634c1edc93ad

    SHA256

    fbe59feb2148a34997d49b40c9b5a92223f6d0a929006c8574bc049677573009

    SHA512

    e5b424f1a27f2c5ada1e114a1978dc105d3b4383e0c32d1170d026376d231683f7f5ee3fb250bc83b0acb663ab9459d9035638fd59edda57b51058d1f14d738e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f969d6465e6702131c5a2cd49ecd4f8b

    SHA1

    37988d5bc82700ad271a1b406175c63560754e7a

    SHA256

    5bc2ddfdcd764c4066056cbc403a57baa146c3c7bc2cb266d4534798e41d94e8

    SHA512

    e85f64759485e72f263e603aceeece397916b0cb2540853d006529a270b8470dabf3ce391dfe215ec64bc1244f1a95eb23a07c52f1015285a247190d420cdf3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d6bb28c260f244b5025242bb5124724

    SHA1

    349529bc5b9647d92908f9ccfc4729f4cda6789b

    SHA256

    39cee773a6d470da53b8169f754f50a3bb7e9cb305fcc667f5430878fa571d6b

    SHA512

    b6ab6f0df72b21b7a8a9f07751bd9ac8d026bacd2f9d48c27aa045158ad99c58f5b78db5c5c20d92a30eda8e842e6cf4a31039c7bca77e1342875847565ad85f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9edf60629671fca89d33413b0ba74261

    SHA1

    c3386654569f4f2aa0f4a5cce5827d3231b6c616

    SHA256

    44e1304792ee42c7f0424156739ca069773f184b4ef4b996666b48e9452cb24a

    SHA512

    95cf2e7c4685b9a5d2fb1d258d0d7950d01825a3beb920802d826c4485d9b5c9dcee45c88fe6870c982b134a09da48134473bd0400b3a69d5206f207b36672ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9da9418c6db391bfdb2e1d2bc266abeb

    SHA1

    09d3d3c895c2bf604f103afffe69a0663e5779d4

    SHA256

    c43fe145e84d2f6ff4b761ab30b98f5ba291f48d5eb971f80379b252da552c98

    SHA512

    54e718c2b91530c804facd714b1e6b1522125c81b392885b5ffce79b42e858f9e9a2b144d06d5b6ae1ce3e24302fcd3b8d805779e256f5e663e901f5e845cae3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19e510f2098b3a8dfd927325f717a3c2

    SHA1

    0636615353c71cd825004e162ee987afd8a18212

    SHA256

    b532c3b794d48cfc199ff91eb39a80c0ede0064b409e13ad4601b97907073565

    SHA512

    88b35564b244c723ab74dea4135041d168b804315b5f971a79f3cbabfc8e25668a2ff8f2e30bf897024bfcec6d088ebc1487e19441a6ee7b8f7acfbe5ddf45a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fff8eb421b19a44f9415dc6a75827a1b

    SHA1

    c8b37adac037b576e56171e8910d00bbcc3bf8c6

    SHA256

    85bf89072f8389c65706fba30fffa778e22a40a81d94169e15068d0cf7ddf923

    SHA512

    ab32faa1b5c105ff3c630fe1586b0a8008cbc66349fe8007cca2dbc27e95781b746955f5eefa6a557178a19fbb7edda161f9c518573778b135d68ce7c7215c2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5219f61f51ba358bd99381554a3f5319

    SHA1

    921d4d65c55c1cf345e4e3a17909eafd79167417

    SHA256

    ff93dae26db6624236a5315cd34975a6b3aa75dd19839ca15868e43280bbfe5b

    SHA512

    7d881b7cdffeff0b5014da080ad922ca9f99ce6720f2fc4059bd59370cd583fd69c49969dd8b25c0b7bfb60d6a4cd2435c8bdfd1adebf6d3c19346792ddad99c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    086f46192a66a582a87bf2bd0f5fe7ca

    SHA1

    253a44c7c2917f754658a1ae1f71aa1e1a45c9f3

    SHA256

    e37aaf39742247474ed0395d620f315e097873d86e2e2fd85163592690e929b8

    SHA512

    5308f91f5fac813d10c06ce0e7a4dcf180a35252ef4d8847a69ec7c937cb07aeb7100f223f363150b9369107568e1d520f7c9342a7d9967b5fa86fd4963e16ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63064354aa4d74eecab6af0ef240db0a

    SHA1

    178629b44a3676af89eb0770b8420a3f23e36c1d

    SHA256

    c0d0c492b0e06ddf07814955e0b19f661742f83eec9267c497140241d1aa6a25

    SHA512

    59cf7e7b26402c90cfa404c597c3510247424f33fc0a6aeee1b2383fff5e0c36a8c1a9fef7ec1c0a0bd017199e846313286d2fbc76f024bc22e834dcd469d1df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb9a6a8b97c977e49ca247627abfb737

    SHA1

    d08298577df5aedd04271f409248efbd62a20a77

    SHA256

    d46a27d2b9a3650cd7cdab5f466259ad2662799eeefd4e3c1a8175eda2daabdb

    SHA512

    09fd2ef8ed8061531cf7470af660ac74521eaccc1ef0b3225b2a46d2ef62ccff0e31cc9a60949eb518cabe384f34d7e176d844716433baafbd3b288867febd30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    441d7fa8f588d9f6af1a94c06de8e1e4

    SHA1

    73cf3dafea18b16592b45c25b7a78dda7caac0cf

    SHA256

    e3d994add46651bf945129f82e3200d2071148963005cd03ec445e6932cc8bd5

    SHA512

    3d1cbfab45138a4ab948a00c37a57eb7976eed3014487b11540fa744ad891869c7f547f93f47e2397b638ce30c7f66e32a90e8b7f5585d2ab2cab13ad685ec2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f64dddeada7ac0b00140675fcd17e339

    SHA1

    40bd9a04326751ead2d9e7611aacb2500a29e38f

    SHA256

    a681b53e75ca4250032a29677a6fe895e9d296697d7a319c1b8501b75ce35149

    SHA512

    6f6c69ec97061a11b9e215a8fdf1ba06af41ad78118f7af46a36e26fc542bd02fda0a5b7a3063aebee33e0cb0d3fd5f7d8742e29d90584822f35148df24d5482

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e9c203172d6ce259077db4ac2ebf719

    SHA1

    b39c0e2a4f620813dfe598c36f21cd65b4941733

    SHA256

    027f08578e55da5a6991746514c8c71d0719858eb2001a2f79e2399ebdd88966

    SHA512

    33a1e571957b757ec368a22ff0d01a7c0276fc5a6058db829887808bd68a03e0053a9527a9875017ac61c5509d781eac442d4d84ca3c643795a5f511f733b847

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4871241fbe9480650be36911813808cc

    SHA1

    8fbacf0750a5382228c197347ea635759eeefbaa

    SHA256

    c2250a0654d4825ff81a785d32cfbceb4975fe117cc87ded72b87c74e5a180ac

    SHA512

    4bd1720232c579cdb8fadd91b412f703662b6dc9271c65a0001f044cc8f717965a71095fa6c10bf8f40e7acd1d9259035beaa42a27bd653006565d262091f0f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2b2f4e73c1edaa350427ec316923d94

    SHA1

    7e55e661ab9dda24fc5cb1e37e1884a0467db9c8

    SHA256

    a6dd3b209405a2ff599b8d9039452501d082323bca41fd1c2b289022e88ba9a5

    SHA512

    d244640bd8b4e9b325eccfd0635b02c14acc9ea7468f858f3e2d387abad0ff9276f985cb202a34ab607c9c3d648a2b78383ddabc7ac24596103d20577f33c6cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0592fe84a05af6ad6ec1ca144443f4c1

    SHA1

    d4b8c3a8d23c581b46bb9934732b9b35a79ee8b3

    SHA256

    5ca0bc725a016a5de12b8a13c1983b220a76716b71e3c40ccddfe8f63b3a8823

    SHA512

    3b80925f3d531be1b871429e1fb688fec14df36b248fc31b2a5630ddd09ee13589de58acf9363b2f5b32ca2fbec07f29e6504f7ef9afd457038c12d963f1f004

  • C:\Users\Admin\AppData\Local\Temp\CabC016.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC0C6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2100-7-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/2100-0-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/2100-1-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/2100-4-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2228-6-0x0000000000060000-0x00000000001B2000-memory.dmp

    Filesize

    1.3MB