Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 03:37

General

  • Target

    f9a3ac2df15abe83e8b0a9db37008dde_JaffaCakes118.exe

  • Size

    739KB

  • MD5

    f9a3ac2df15abe83e8b0a9db37008dde

  • SHA1

    894002b27b9965b7cd8fbda5cc4f2608f95705c1

  • SHA256

    54e4f6d6b8dea267a787a2f9ff80b493e9febb5383c0cc62964b77dae406eafa

  • SHA512

    902952dcde5e5f5ec8ea38b7e8bcd909591e2d2a4056d22a0f9be218f71955051800ad7fb1f3461effdf79e0826218d034f82cc2cd61e5cad06d75fbf2b35f8e

  • SSDEEP

    12288:vhc//////MuqVVuebVfqT0R5LzdFpFGSkShmlNgzdO1BjfCtGdIYH:pc//////MbVVueZfWq3zwBOzUja0dIYH

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9a3ac2df15abe83e8b0a9db37008dde_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f9a3ac2df15abe83e8b0a9db37008dde_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\f9a3ac2df15abe83e8b0a9db37008dde_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f9a3ac2df15abe83e8b0a9db37008dde_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b153dc26f6b887812b4cc991dce01de

    SHA1

    89849d9e605fa3d37c99d7c6d17df74975b41664

    SHA256

    76007c34d2fe92d2f60c7826041b4cb734c5d37a455c6f42acaa6b85b5fba280

    SHA512

    9d7f55b5b4cba04e9234602b8c5d45181934006e70f11f28bbedbe4b8b8c6b21f2996f74e8682fbcbae136b5b52c5b17a0272ab40f1cf0004b28891822cb3ce3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b6f7e33364ac1a7633a6234affa6a4d

    SHA1

    063c66f649136e03ab11a88fc73114ad4dab46a4

    SHA256

    10b32b1e9c1173a74c380ca8c58c9147da6c636aeadc4811c1b231d22c1e7ab3

    SHA512

    0e3f3ec0fe5e56e17a770778e48c3017d75fb5006da482e2f3fb905a69fed5a002b49325455737e3fde4da2d4eb2c8e73719590180e5f6c3223662c89fd6634a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5dca491ed240ca3f3e008d018a011b6

    SHA1

    bf6ac488461ca193cd5574441d9003a21debfe20

    SHA256

    c387eca1af05af5a9baae6fee1f5d8524b4bee71d1cac23f6c664ac08b308700

    SHA512

    4bfa81ca47dd0cd488e03050fbe7f66d4dc6ddd530e17ecb323694c3c5639eebce941f123e061987f3aa9125f2a92172c57d5b7220dd1ce771136d2af02e55f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62deb515a90f90aff2f20e8dd19b0a5a

    SHA1

    7a3d1d59377965f74e3b0010aa6948fe15dc72f8

    SHA256

    78a8f71a9168661952fb310bda0c1faf3eef56d996a36c3edba3b56deff3177e

    SHA512

    91fff1bb8eaf91e1f4e6b8ae37ed76be4a98d249c8619aec2b4d8266bbbe3cce0a1e5bae162240908f5d95e095166448393178327cd660f5a0cf41e2378202fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbe1ac04c261605c5669c827e6b713e2

    SHA1

    b6fbd22a080803a2ae4e20bd7c8e58a9b8bb5509

    SHA256

    3cc877a3d9be70c53d3d98e026fdb87767d2bc8baa3d07fbbd620923a6061298

    SHA512

    d6364fe6f1039b092b877988c6c791af2f1dc7c29cd6f74fbdc1df699e78b8b6ada1a1e8da5c6976294c4d79aafc3e024ab66bbc837963cf39b65b49aa2a1d3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a9e69135770ac61296cbcfa91795752

    SHA1

    7dca3315fc558ad5080c508123476584472a5e18

    SHA256

    355116e30d38687de7c6286701780d77b4c18284b7549dde7d63c8ecae760b2a

    SHA512

    1aaab5e1777aec9fd5054f70c696fa37e5c951881f3a6046c80aaebfcf2a91672e2a81630677f06ee08648007928e4a50128f8299f89ed37bdb92feff50fa534

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4337c251c1cb9424c946d60c546b1c5b

    SHA1

    c68dd04ecd1bb0eb01c9b9807b7bc7abba08d3b4

    SHA256

    97b035add7eb8c1f76fe88fe9d3ee920d2957d070cc2a6da534b963c1c1e0f25

    SHA512

    57139f23ab51382ce1f5e8cdeb4e1a7db16b1e51247d5f21cddf872008e4e4ed2d879d0e62e4c510ce044c0f0f111cb6aaa0796ac225e7ba9f623c585c5d9182

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4e3c7e8d986ee0871bee0a9ddbdce60

    SHA1

    023eebd17e0b12af6ed6175b252c7d538168aa91

    SHA256

    7e9313c086cbd2396c5cec8a0b10cadfece5ae1b0ad5b9b0d1d1fa564f97f8ed

    SHA512

    69a5a35b955b3313d5fe5a4fb43365c6fc3bf2bd54eb32b2afb2e943776a049ba6b0bc35c8e88f240b7c3f7735d5a5a0b2ef69ffc55269fef050cc60a84b0d30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    831208b3b9443867c31438661c470b36

    SHA1

    815562cd9d8d6aa8e0991e4ae1e86c2f2307605c

    SHA256

    f057fdca61f1ba4ed279f78abd4b7dadcdd00946081657f6cce3d5b285f47bfe

    SHA512

    1abc3f4c04cb76dbd70b06693825893305ec77b1c7acfd8b5447b4148b3a7009f0a1ab5fa410c7b722bbedbb15f312019de966653a52f7c2d1a3d97f71f08865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f83779835e5a69aa10237da6f6ee74e8

    SHA1

    14085fd102863c092e1a98a441ae74c86ffc4c28

    SHA256

    331143d89d9acc3eb37ca2982626fd0ab91398ee6f3f30466f520c7f7efb693a

    SHA512

    9e28df29a62459cd807cc3616f5bdac4b1468e0bade0ebf92e3d38a3dedd18e2b79ab45a2791b4820a3e5c432acbde2ac3649619ba3e1e27289aaf82558ee56f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b5969dde7daef94b2d3ea56d6b8ac98

    SHA1

    4a13a0f87588d9254b17455b598e60c6cc485d9a

    SHA256

    b888bd2019f28dd7f1ea4350aaac1cadc6c2974bd97d88841f3a73529e593ee1

    SHA512

    da59d7edf9df912eb61fa9c9dff430520902b0ae9db2ebb207b954f13e5126b0921b2f0bc5aae3dbdd79dd02cc160d973238fe2148eff4a2c8b8bb3050065ebc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13cb82b5fbd64fd9b303c1d29c3a5154

    SHA1

    28b4c3fd4f9a2c6efc17cf88847b56ce5b07311f

    SHA256

    3a8d954379174b2e8048cd98d8a45061f813f7452e10997108894e79f88c9d13

    SHA512

    e6809c99d5f6abe70fcabfdcfd1860017727668149504064b7056c72a30369b8fcc6acf333e99b6d2ac52733c9c54e7124f6cb51e799fef5a00154051bb3c9f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ad85c73d4cbc3cf9a2d84c6664cc2ef

    SHA1

    dab511c29f32d86ceb07cedda27d5a50888ddee0

    SHA256

    d885e7cfbe562901332898fbd3347d6510ac5735f2af0f0f4180e818460a08c9

    SHA512

    36d17ed4cb7a15fcb28cfbcdc44b6044b1369d0cf389ccaf7cd88a29e87355d529aed606f8ba1e55ec23ff69c4349808fbcf0245a0b7f55ba36ff4e0165ca3c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6953fb81af9a0581b29d736d8aa281bd

    SHA1

    3067666532ed735d3b0cbb263158c4471580e8e1

    SHA256

    2479554615049509ed0c8046d4f23678b0cb08cdd7ef082c4656853ded3ce5c9

    SHA512

    19d75c627bafde66bcf33b68b31ff215e078b92c0a12fec6d1bf4468df2f7d9a5518af0215d19ab7de3170fdd03c523c5730efac7e8eef5746514338ceb21bb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6e42c923724d1d09ac0bd1be92c511c

    SHA1

    54ba89f31c24233395b29b219b3a06f875500948

    SHA256

    afaf4788caa813730323234beec22c8a07e5abcdabf44d9cd427388ec46473a1

    SHA512

    51606a0cb4d3ce5d241e649aaec484f0053037943b90bd6149acb9ad93e67fda441eb715345565bf26c9b27275b64ae792b5131a43b59fb75f9e3390c17c7e35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4578d31701c4b35d5ecad8f8960dd6e

    SHA1

    2aee541bdee10b1e607cf8c01b39f0e89ed80d7c

    SHA256

    b1e41ee53eab89f09ea17e1605f68436fe5a865d48e76ca5b31f45869aebfed7

    SHA512

    a1409f800ef58a89e6c6c9a2502ba7c09a769ebffe4169d0a770905bea9a41665ddfd1f08a5ca13342d66371577dfb365094d983e181b52f3a93be72309a1d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aef29782f5e572e6e3cce9cc313f315

    SHA1

    a7c72ab6d6fc85ea7faad7f541b1267477ed8dcc

    SHA256

    2c9f181d4df6e7b3bc2e7c1dee58d86f38fcc10d57bee44c6c8a7038a6010eea

    SHA512

    0d19303d4173a30de16a08805b34526381a49deea5a5d08dec58a16f0ad0dd479df88f55f96fd3f838ceecf207241461edad219dde5c4778b4dd7c0e52b97727

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4970457bafa5e2f7114dbc825d7f940

    SHA1

    1798d1e113f46ea751d272d98957ee38fd42f147

    SHA256

    81c72a44807c0ccb10d5a30aba1b3944b7a89a7d7caca8845827bf7d8e9731bc

    SHA512

    4bf5ec88b6ae56e23d059e787f48b1ffbb87d6ec1ffd7a36fd37175db615f1aba8fcb172257396a6032bf5da2f8072490c75b7c9646434d0284b7c558cead42a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c0b1d0693fb68f4470c2eff539d044f

    SHA1

    e1abb4d560118e9c6fc76faa957a7255d11bdef6

    SHA256

    1fde25954ab7b65c081218efc66ff66e6dd817ccaed01bf5baffc93456ca3570

    SHA512

    fe20e687c45796dab5e7a89cce6b3a501b71a07f1d1b70cb1e96c10fe77169cdc0b4739b2bf470f76055ef420bad4b348a1f59f99262c986b0600fddcfc911bc

  • C:\Users\Admin\AppData\Local\Temp\CabD950.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD9B2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2196-4-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2196-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2196-7-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2196-6-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2196-9-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2284-5-0x0000000000060000-0x000000000011F000-memory.dmp

    Filesize

    764KB

  • memory/2440-2-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB