Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe
-
Size
481KB
-
MD5
f83a0b168d32e4d40f59bfc25e0bb63a
-
SHA1
7edd040701b90f04bb53f8d38289c7e3fce6f0a5
-
SHA256
413be11693ba6eb58843857651f02d19eed8d47381de480898e4bf54ab809d36
-
SHA512
d6fbfc6b8272b76add40c8bb8183e1308c9880d99a6f5e00aa7dc865e4aff7e7331d3718f55c305aa25b1f3a7672fbc962fabf863e5769b6a2c9f6d1c22bd605
-
SSDEEP
12288:VX2Snj9WrvJzb9tLimxAbiyvuQ2zGuUKQCtO8bu:l2Snj9iv1b9tLPAba6uQoOeu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2100-1-0x0000000000400000-0x0000000000552000-memory.dmp modiloader_stage2 behavioral1/memory/2100-7-0x0000000000400000-0x0000000000552000-memory.dmp modiloader_stage2 -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2100 f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 2228 2100 f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~1\COMMON~1\MICROS~1\MSInfo\2010.txt f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433510363" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B234AAB1-7BF6-11EF-A444-523A95B0E536} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2228 2100 f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2228 2100 f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2228 2100 f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2228 2100 f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe 30 PID 2100 wrote to memory of 2228 2100 f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2348 2228 IEXPLORE.EXE 31 PID 2228 wrote to memory of 2348 2228 IEXPLORE.EXE 31 PID 2228 wrote to memory of 2348 2228 IEXPLORE.EXE 31 PID 2228 wrote to memory of 2348 2228 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f83a0b168d32e4d40f59bfc25e0bb63a_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78709d584ac421395d630d3056b383c
SHA1d2977dfbfe68a5782a7a270b045dc9ade05be112
SHA25689d672770c7567bce0a60c8bfc58cba3628ee3a9c5cea4ffb882d23769025cb9
SHA512d4c5728dd748dc9acc15a45647f268b6f0bac0cdde91496f7f71e95bf503f686322a79c8797de90b20781fc582fb2d2c599df28ae66efa39f6a301151db693ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313fd0876005a2e096910db87c8bd677
SHA16b9165a08fb3da321ccec9c05b65d9ba8aee2865
SHA2560ec34615791bde855d7015c602bb1c2355f4da1fdc46bc9c059e957ccb50681a
SHA5125064241a1c2bb09c644c68ace308f13767803ab31b6163a54fa8ea5776f43c872e000550ecd9e25ebe49c524e79e0a0fd8698094535c7bcb87cba8a94db1d734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab02453d2f21d2d6a4d3962f350ff7d
SHA1f2908d4614bfa3c3c0e9dd4c5f79634c1edc93ad
SHA256fbe59feb2148a34997d49b40c9b5a92223f6d0a929006c8574bc049677573009
SHA512e5b424f1a27f2c5ada1e114a1978dc105d3b4383e0c32d1170d026376d231683f7f5ee3fb250bc83b0acb663ab9459d9035638fd59edda57b51058d1f14d738e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f969d6465e6702131c5a2cd49ecd4f8b
SHA137988d5bc82700ad271a1b406175c63560754e7a
SHA2565bc2ddfdcd764c4066056cbc403a57baa146c3c7bc2cb266d4534798e41d94e8
SHA512e85f64759485e72f263e603aceeece397916b0cb2540853d006529a270b8470dabf3ce391dfe215ec64bc1244f1a95eb23a07c52f1015285a247190d420cdf3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6bb28c260f244b5025242bb5124724
SHA1349529bc5b9647d92908f9ccfc4729f4cda6789b
SHA25639cee773a6d470da53b8169f754f50a3bb7e9cb305fcc667f5430878fa571d6b
SHA512b6ab6f0df72b21b7a8a9f07751bd9ac8d026bacd2f9d48c27aa045158ad99c58f5b78db5c5c20d92a30eda8e842e6cf4a31039c7bca77e1342875847565ad85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edf60629671fca89d33413b0ba74261
SHA1c3386654569f4f2aa0f4a5cce5827d3231b6c616
SHA25644e1304792ee42c7f0424156739ca069773f184b4ef4b996666b48e9452cb24a
SHA51295cf2e7c4685b9a5d2fb1d258d0d7950d01825a3beb920802d826c4485d9b5c9dcee45c88fe6870c982b134a09da48134473bd0400b3a69d5206f207b36672ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da9418c6db391bfdb2e1d2bc266abeb
SHA109d3d3c895c2bf604f103afffe69a0663e5779d4
SHA256c43fe145e84d2f6ff4b761ab30b98f5ba291f48d5eb971f80379b252da552c98
SHA51254e718c2b91530c804facd714b1e6b1522125c81b392885b5ffce79b42e858f9e9a2b144d06d5b6ae1ce3e24302fcd3b8d805779e256f5e663e901f5e845cae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e510f2098b3a8dfd927325f717a3c2
SHA10636615353c71cd825004e162ee987afd8a18212
SHA256b532c3b794d48cfc199ff91eb39a80c0ede0064b409e13ad4601b97907073565
SHA51288b35564b244c723ab74dea4135041d168b804315b5f971a79f3cbabfc8e25668a2ff8f2e30bf897024bfcec6d088ebc1487e19441a6ee7b8f7acfbe5ddf45a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff8eb421b19a44f9415dc6a75827a1b
SHA1c8b37adac037b576e56171e8910d00bbcc3bf8c6
SHA25685bf89072f8389c65706fba30fffa778e22a40a81d94169e15068d0cf7ddf923
SHA512ab32faa1b5c105ff3c630fe1586b0a8008cbc66349fe8007cca2dbc27e95781b746955f5eefa6a557178a19fbb7edda161f9c518573778b135d68ce7c7215c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55219f61f51ba358bd99381554a3f5319
SHA1921d4d65c55c1cf345e4e3a17909eafd79167417
SHA256ff93dae26db6624236a5315cd34975a6b3aa75dd19839ca15868e43280bbfe5b
SHA5127d881b7cdffeff0b5014da080ad922ca9f99ce6720f2fc4059bd59370cd583fd69c49969dd8b25c0b7bfb60d6a4cd2435c8bdfd1adebf6d3c19346792ddad99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086f46192a66a582a87bf2bd0f5fe7ca
SHA1253a44c7c2917f754658a1ae1f71aa1e1a45c9f3
SHA256e37aaf39742247474ed0395d620f315e097873d86e2e2fd85163592690e929b8
SHA5125308f91f5fac813d10c06ce0e7a4dcf180a35252ef4d8847a69ec7c937cb07aeb7100f223f363150b9369107568e1d520f7c9342a7d9967b5fa86fd4963e16ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563064354aa4d74eecab6af0ef240db0a
SHA1178629b44a3676af89eb0770b8420a3f23e36c1d
SHA256c0d0c492b0e06ddf07814955e0b19f661742f83eec9267c497140241d1aa6a25
SHA51259cf7e7b26402c90cfa404c597c3510247424f33fc0a6aeee1b2383fff5e0c36a8c1a9fef7ec1c0a0bd017199e846313286d2fbc76f024bc22e834dcd469d1df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9a6a8b97c977e49ca247627abfb737
SHA1d08298577df5aedd04271f409248efbd62a20a77
SHA256d46a27d2b9a3650cd7cdab5f466259ad2662799eeefd4e3c1a8175eda2daabdb
SHA51209fd2ef8ed8061531cf7470af660ac74521eaccc1ef0b3225b2a46d2ef62ccff0e31cc9a60949eb518cabe384f34d7e176d844716433baafbd3b288867febd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441d7fa8f588d9f6af1a94c06de8e1e4
SHA173cf3dafea18b16592b45c25b7a78dda7caac0cf
SHA256e3d994add46651bf945129f82e3200d2071148963005cd03ec445e6932cc8bd5
SHA5123d1cbfab45138a4ab948a00c37a57eb7976eed3014487b11540fa744ad891869c7f547f93f47e2397b638ce30c7f66e32a90e8b7f5585d2ab2cab13ad685ec2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64dddeada7ac0b00140675fcd17e339
SHA140bd9a04326751ead2d9e7611aacb2500a29e38f
SHA256a681b53e75ca4250032a29677a6fe895e9d296697d7a319c1b8501b75ce35149
SHA5126f6c69ec97061a11b9e215a8fdf1ba06af41ad78118f7af46a36e26fc542bd02fda0a5b7a3063aebee33e0cb0d3fd5f7d8742e29d90584822f35148df24d5482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9c203172d6ce259077db4ac2ebf719
SHA1b39c0e2a4f620813dfe598c36f21cd65b4941733
SHA256027f08578e55da5a6991746514c8c71d0719858eb2001a2f79e2399ebdd88966
SHA51233a1e571957b757ec368a22ff0d01a7c0276fc5a6058db829887808bd68a03e0053a9527a9875017ac61c5509d781eac442d4d84ca3c643795a5f511f733b847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54871241fbe9480650be36911813808cc
SHA18fbacf0750a5382228c197347ea635759eeefbaa
SHA256c2250a0654d4825ff81a785d32cfbceb4975fe117cc87ded72b87c74e5a180ac
SHA5124bd1720232c579cdb8fadd91b412f703662b6dc9271c65a0001f044cc8f717965a71095fa6c10bf8f40e7acd1d9259035beaa42a27bd653006565d262091f0f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b2f4e73c1edaa350427ec316923d94
SHA17e55e661ab9dda24fc5cb1e37e1884a0467db9c8
SHA256a6dd3b209405a2ff599b8d9039452501d082323bca41fd1c2b289022e88ba9a5
SHA512d244640bd8b4e9b325eccfd0635b02c14acc9ea7468f858f3e2d387abad0ff9276f985cb202a34ab607c9c3d648a2b78383ddabc7ac24596103d20577f33c6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50592fe84a05af6ad6ec1ca144443f4c1
SHA1d4b8c3a8d23c581b46bb9934732b9b35a79ee8b3
SHA2565ca0bc725a016a5de12b8a13c1983b220a76716b71e3c40ccddfe8f63b3a8823
SHA5123b80925f3d531be1b871429e1fb688fec14df36b248fc31b2a5630ddd09ee13589de58acf9363b2f5b32ca2fbec07f29e6504f7ef9afd457038c12d963f1f004
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b