Analysis

  • max time kernel
    69s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 06:35

General

  • Target

    2c8ca337d3f57c127ce9fec4b8bde3d4_JaffaCakes118.exe

  • Size

    717KB

  • MD5

    2c8ca337d3f57c127ce9fec4b8bde3d4

  • SHA1

    fbe37a0a779d5f009eec5d94edeee7a347ee1b28

  • SHA256

    ee6cfa9cd7f3f9fe0759ebacf8f5fe4d848e9097737ae69ed083bd68d615c894

  • SHA512

    66bff3a47c91e2df4091e592675afcdb223a8e2006a03d143e0c58ae2276b6ab754d6430ce3d22622ac52597035a028794e3723287f4631f828bed418bafd2a1

  • SSDEEP

    12288:+c//////K4x2hhiyL0WYlTJPqFLTb6oIxSs6tnPnMZ8/ilgLZapFgDg9tKK2xumQ:+c//////K84L0WY5RSLTWoIx5+nfYVKU

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c8ca337d3f57c127ce9fec4b8bde3d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c8ca337d3f57c127ce9fec4b8bde3d4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Users\Admin\AppData\Local\Temp\2c8ca337d3f57c127ce9fec4b8bde3d4_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\2c8ca337d3f57c127ce9fec4b8bde3d4_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a12b933b47b7bc8468cf9456121fc60f

    SHA1

    6ae004f780c5b678013290c33c3898aabf9e5a3f

    SHA256

    daaf6eb4d58628a262cf56990365ef3fb269476dd850ae1ab05f92233af30423

    SHA512

    29830b0dd1a89f8a7191d1886886728bcf393eea1d4141915071e025302de2285de9b2a72b26efc1b87c068ff5ef1b918bcd8b6b85077b608894ae294e44a130

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06cc8deb1065026403ee7a3ab11bf061

    SHA1

    bb367351c5e1b9848cdc0eb48d25787c14bda0a7

    SHA256

    ddc965a5e50b3159bd5abc7371d28c7d61b2193ae6aa34c64e2b8de3bec3c94a

    SHA512

    89f0a1e1db83f6b976b101ac25ff553a8bff1660230c0ab47bed01db075ab61dddc6418a98bd75805db21034fe61a313395e93e50230cd908e626bb9de76c2b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a3de79839b7c9a7c55333ab08e0b4c5

    SHA1

    6d4a737d1f326620a248bde84baafa5eba5c3800

    SHA256

    f0349e8567fee704d9ddc563cef7fe33c2617e15c30ed7dc389cb76fbed617e7

    SHA512

    65acf4d2e9cf83a6836975a3d8e446261b81c967808535b2eaf2da88927f541d2985a29ed63b5c4b96ee73a4fef260a427d5751826bd82cf67bb72158da8f4c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4faf5419cdc938a8b39996f56c74b0a7

    SHA1

    e6caf285f3aca74bd9cad478c6ae0b0f46db0ab2

    SHA256

    53265a2b4342b924e2197355802bae33c53fafc498c861e071be826a87b7f80d

    SHA512

    93b47cb8c8b1ddaf0d12778f231b13c86cf89f7658facd3083b36f4552723a508f430748f0d1e0491e243d7bcec5eb18ca061874b5344478ff7521929d34b775

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75d7b308b8ca4b097243c9886fac621c

    SHA1

    5e7577d8c118d463c0b0dc5b96a07f6c54760d6a

    SHA256

    a30724e5691ec043fa104dc85d34b7f65cfbc162e5cec19b2eed5c4bc8e27631

    SHA512

    889da939a8047f5c63945e528050d6feae2c1b445e25ad01278c09f5bd2598d791b9aeeb1c2259fba976e5eae08a9a51d522576e807d7277132075b7bb95c97b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ea5f7f1fab849b30c3325fc79e56924

    SHA1

    c52328d3965f2e498bff7813f59209ca927023d6

    SHA256

    347842a3bc81f3ecedd11f32a5908d88609785e0bfceae91281981f693b50df1

    SHA512

    794c466461957bf48513adfe029d6c547a1e71f2877866d7df193a6e5e301cd1bb69c7bcc2673554dfd9af088c894de223447457d1a05b965c9ba2d9df32e2d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    333d041e47c0dd96ee26ae6c5b0bd021

    SHA1

    851be4ddfe1c8874dec272147524a7e204ce4ded

    SHA256

    bbcb624358d07148789f0db503f681309b895e82aa1ceb0af701b9adc41ea0cb

    SHA512

    c691b24d9dfa5c914716c143c533ab911cd29dca5816be05dacae221f4a3134178d89cc9d8b28516a405a611a91970c9146a6b706cb9552c5bbd71f6010d8e27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    435160e56ef12651fd7c66e7652ae473

    SHA1

    d838851c503a0bd2075ea854e9b954ceafbd14de

    SHA256

    f1a35c5343ff015df5de02e59a1af7f986a7172e71ec78b9295dc5f2149ced56

    SHA512

    dff3dc36a3c6e12be6adb76e96f2dd968b42b74839643af737b668d26f29e4d6b8b6410d39caee169918f953a51463d3e3aecafa19af2733c3e6c667ac11de1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a88e44d70ba6ef97bad68ff9d0e674ef

    SHA1

    4751b66efc59c77d121379ee3ad908f4e1cbf312

    SHA256

    ae2d76fa572b12df250527aa5189ff0af0591902ef45e1b40175ae8304ee8aaa

    SHA512

    fdf2b0f10d9d12e58395b7ee5e95662e04959bd04b641d502a1364e3c721ca89a8e95e43f1b363666318bbe2b240786e6602feee8949da8fbbf823f57d636e99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    532019ec3c8c98ecb47c00d3fb39bca5

    SHA1

    4c27983b90e1ef709d876095cc9646555ed67263

    SHA256

    40e133cf6765bf78c15cdab43fc96d207b9334e08b16c6881641d0aae11cfae1

    SHA512

    313637fee2771e326aa4af3b46b902ff251ab4160292222bf2e8bd6eb75bab7d02f0215073953447566c7b3eee7a0a82e73a5befa22751e903b84cf344ce8419

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e45a314612df820dae38c230cf1f34c4

    SHA1

    3109ba1e30d389235cc77def31c9dbf0137bc751

    SHA256

    133c5b755c5ba94a8cda4ea4e601624cb88f69626573cbdeec09ad446acd1530

    SHA512

    62691232a48f34b9c5e10efc04c0b3857ae956b676983aff84d94983ae3617d8090e5df3e50638ef9efcd586389c045326cb1dee2330384d39e84b9aa7f7a496

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85f9ed19d4a132b6d62a968aed5c026b

    SHA1

    9e69d4280ac458ab1748c652179d106f1a627fef

    SHA256

    c3fea4217ba6d14d611f0475bddbf50a6e1df92751b290b5fc0f2feab1f36d29

    SHA512

    1fe3022721599ccb67efd759747438e110c4a44d9d1a150c09fad050498f3e65503edf0ac4b9de14e41d7f69f2f393a15d71e573093de9b505d6aeb32692adc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6c339b85abd5597cfdc0ecf2f3319d4

    SHA1

    af268152b7a8f53d555c238780b409a0c07287ee

    SHA256

    8ce7a843b4dca53fe07b17c03805770b5cb45d444562b4dcf89d8375622c0fcb

    SHA512

    fc03a67c1883a4250eec93b6761764369c198a7d99d8c85cb2826b357139b80e83b9293cea5bd0ff5dd50f65f1ee4a1cc64bf5c0b81e944cacbeec3eab68f88b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c325e2d050fc3962a53e9f9684482be7

    SHA1

    c2def0cc2bb14ccd7a46d1f68ffac1eac3fe2d92

    SHA256

    b094d8f6bf9f60ad2f027316ef34301a4ce621810ea6333584584d23d060b4e5

    SHA512

    32a388cb98aa243e9c9c2d4cc187f401d0f992a64530eebd44f59c4b40b4b0fa0246bd5e7372a0def468a9de9bbd1eb29e9c96d9da97c414d8a08127a276274a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    686a20de037a8bffc968dca41995cef4

    SHA1

    f7a350bb939aa6fe94680757067c683f34e65335

    SHA256

    50a1d8c4c8e5437d219485de22bbffe2fd834fb0bdf53ead11661ac1aaa62a94

    SHA512

    5399a6f72d3055493218c9be22afc4a16e184508aa25d643dde67c3e08180d84644372c20482a99862e8c0fd809a877573f30be07192750f014e2b4c2abbc090

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e39fd05d61667d66af15fd5845f87a89

    SHA1

    aef1d76a7885ac749a87757a4ea16151b50fc5e7

    SHA256

    fe874f25bc532ee337195a8ea1411f69cf9b1988905fb8218a285959306c1976

    SHA512

    ba08d5c25d81d204e3f9825dc82c831b5ffe34917f04d441e02564a717164d1cd44db83fcc14da2ac351aa62220ddbc100bfef9f31eb411e79097a41e26f0887

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6669e8b524e9cf2c012ce157aa82012

    SHA1

    54a816f0199f7d136f8556e49b602562a8710412

    SHA256

    e80abc8f92eea376e0ac2ec83faa7808da6c21d0f8d4c6a2069b331dd43a8a5b

    SHA512

    a9083c221a821eb71f0d1c8d5f5c03ca2fe94c2e15e272e0361eb0aad7b0d550902c2f69ce5c38939019a14a0f1d521fe896ad55b23c150bfdc9e12790353da3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d85d3fef017469abfaaa9456c99e8da

    SHA1

    f9e1cc7701a7c6060fe8b691f15413fe3c93bc75

    SHA256

    927e8644621688b9fa03cb86d9d1cba96bdd6e5b93e17ee62fa1b7335f555a18

    SHA512

    1a33b09851659ba99d25966acd5c3012a84957c120ebfe74933e01121e8b24c7854b7702783b1c94a33d85831d941060df1ee947c8c637fd48af16db72b68f77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    26e228f5efa53a11503de2111b4c4848

    SHA1

    556831097942dd6205bc151c3199d2a6c92cad75

    SHA256

    498d236f9618c4ba81c540f302c08cc91381dcfd2cdd7a88c19f15df8aec9e82

    SHA512

    f59842cf5a561bf0c65c4105c656f037bf327790c73568f526613efed38880f21187393bb9e4f3e5726b1726b17a0c26ee681e423456103e6b090de53cf0fece

  • C:\Users\Admin\AppData\Local\Temp\CabA96C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAA1B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1284-3-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1284-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1284-4-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1284-7-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1284-9-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1284-12-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1284-8-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/1284-15-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2684-11-0x0000000000190000-0x0000000000247000-memory.dmp

    Filesize

    732KB

  • memory/2876-5-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB