Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 22:32

General

  • Target

    8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe

  • Size

    721KB

  • MD5

    8829b5c60f539fa0aa9c671cbb40dadb

  • SHA1

    eebd0c174c4aa318637c8a97b5b2ac7be686a954

  • SHA256

    c00df964658bcaa5b56857cf74adfe899a0347979a38b7d0fad46bacd13d06fc

  • SHA512

    f6555e96f766d46e624223d12026ca9d33265b2e1b8f278110ea390717f208a46cec33fe21c52fb5156049c398a064e9dcc9ee521e776af1639fb6f9a58c391d

  • SSDEEP

    12288:Fc//////rMz86mM/itg5lIQkkjXTz74FeCHVv53lppo:Fc//////rW86stQ9TTf4sW953Xpo

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bcf60eb75835f144f98e5367d4750e5

    SHA1

    ae8379e72358126731328f64f8e095eb3c9e0afa

    SHA256

    77382f5c623f1ad550ab110aa9e03c6b9a569aef1794c29a854095488dcb9771

    SHA512

    6cc2c796ff2d82e3644075f80c41ce79eba166f0ea09162e01007eaeb5f1bf7b08781441cd5cb69478df1668adaef63c9df64e0c1aacbfa553aeeef6ec27caa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e4d5954b01d1ee40888bc42b4895a05

    SHA1

    a0f7c71c3b3667b8a7329d082a7b9067c97cb3d8

    SHA256

    9ef9bc4ec1140e7c7c0681c20c5fc3d0ec3ed141175f311c24590be45cb0381c

    SHA512

    9aa267dd07aafda71cb11864bd6b0b8a8a866acb389b9b6fe59adcf4b75b8d02b07e1b6e2dc3ce1760bbe5d6c54f55604ab6aabaee5c2e653e7458d2ecc6507e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afb64d69f4ac22311fc7fa74aa9fa1af

    SHA1

    81b425b14cc9ba023d095645cadef21b443198bd

    SHA256

    a243cef15267a24830558263b75c7c055cdefa3e08651f1aa102b03636858d37

    SHA512

    8442ae9a579b6261245df7e1aec14d405dd6eec0714caf5fc937cb972efcf2bacc90716b8f1e15d6d87cdecae7e0a296cbd4ee05683f448e0ab8dca05d8560b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94ab2ec2295da86e10b6513575a22955

    SHA1

    654791f056cc3509f4e1ede94024389006107543

    SHA256

    125ac6ad9a6d6e6b40943596e97e694ac624aa9fc61a2c9176c70160122601a1

    SHA512

    04cf5a97da34587dfd9f52a47fdaede7c2bb27449b2f49e7ef1a49b8e7ea3689475b3a3851d21d64ce41a90382d176648a4d7f6bd54977271a4b9bef2f57f66b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7687588695789769b92ccfd84087e061

    SHA1

    ae4f4df3bb61ed5c9de5b23c12759206d9721807

    SHA256

    da2adf2e7c9e446cafad5708cd1c3003ced6d31973d6e81d7cb9b0d509d61b10

    SHA512

    aadf3d7330b113608cef05cf25427de2de57c8e74a32f2ffcebf8e171ac75dd44e1f8f0f0c7f86e497c8144bc9f084cb6e1c42885ad6233310bc75e0fc8b3701

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    973fc8283730e800345655860da51c88

    SHA1

    cb86e1ef54a8ffda835bbdf0b63226bb57fd7de9

    SHA256

    b803643c681fda4f7326fa747fa95afae9ea54c4051951b0e4472bfd97f80704

    SHA512

    7193136219432bcc87269c87e7969c7a1bf0f08a992847ca27e3e28a4354b451ab490974cca53699ab469d1c39f403f064b34dddf77263769a93dae36a5f9d9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19a7bf0ccd368db4bf6da8e942d3ca91

    SHA1

    f9eeb479d427238d471e11fdcb20156c34098dea

    SHA256

    b376262a636ffa514506adf5a50f4eb67674cf13edcafa4979bb60c1f22a27ac

    SHA512

    136cb1d8dbb5ff6ea45017303f8356bb10b34df454fa26ceb605d4a3a4919d6329b348da93eea96d78e140cfd268832289c0f626badea2c4a5f82db3ca0224f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b126e7a5c2a946c01da97297f6a32ca4

    SHA1

    0d501e5319f06103390c02a5836ce299442798fa

    SHA256

    d26efe29b26be6ccd4cd029c4f3c0632c1814ee27200cc32c2667c83559d2db2

    SHA512

    823609327e59ce977c77f392e21d3ae0f7d49a57fe4758910afad601a2f444179faaf2f4ad361c32cd8acf06b5bd89689a5248a1419ed7d7ad17eed488fb4955

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49f9ac888a45a2ad7735aa8c5e6112fc

    SHA1

    68ab8bef0237f26888ea9514947544b201334746

    SHA256

    896a5e11a631a7f59cb9ae6dae1e9591878ef8408d27a17ce1c3a31bb2e7b2fc

    SHA512

    5a9a70f15e7189c1b00f521b31024447368e23a237841d7579b83268ebf8620571359dddd841b9e2259eda30331ef4393830514ba91f61824d6126174a6153bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fda82aae0535922eee86b4e9879e4cf

    SHA1

    b848596eec08c4d45010df93a6592f95abd0d6a6

    SHA256

    c0d056f458185ecd6c11efc56955f06477a866a9bd58368d270f20e9a5de4275

    SHA512

    2bc52c0b1f94917383d3f8f9fc5551959b2a038cae33bf17f4f2ac5564d25f06fd5a169b6b46892aa8a09255bde964601bae187d6193f49341de815571692ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8177f2735ea02ab6f247167c5feffdb9

    SHA1

    967621348f7c6374b07ed436eef962a9350e51bf

    SHA256

    f110996684f6c9cda15c17bf65ec977bb8f3a2ee5bce18c158feeab03df26971

    SHA512

    cdf22e8b1d19f86171900e47b77968a5da37c1abfd878c42efcfa5e10a1a7831efc628220b3fe9277f683fbda70efc4c4777b641e2f17eaf82e46664914c39cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df02c4d4583dbc4cb35cf5e6161bbb58

    SHA1

    812b3a5b4e90a1d5ffa7abf12a1e78ed3307e66f

    SHA256

    8ff4975696e482cf23a821dd71e7458273118ebbe1d137bf2f6db8f0515ec040

    SHA512

    efc1b073e8ad685603bb0e2778c7b7c1b6f65098a38483faa253de1dbdd15ca4b0b42564e6d8e42bf06743a9dfd317c04846e8eb4ed98bd412b7217dd4d746d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5f4d1dc4f1ed86589b83adf08250b7f

    SHA1

    d0ae9aba8735694b414b9a8d12473037d357f2d9

    SHA256

    541cb34bcf5f54e62112f62070fc50e2fd43eafb40a61d9ee25ac4b6c36c5893

    SHA512

    3aab4a1eefd523bbc5d07d47c12f25102fdff245775616b109b22db547ca45a4f7e8857e471a079f6659853c37e65c0ba3273587d03f4d37e9a044716df9c30c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5cdaaf5acbad7001d08a1b763aceac0

    SHA1

    9ac66cc10497b8f41de4576f0e889939ab25beba

    SHA256

    02f7ffaa94db7c06fe9c4f06d55a4f611e467ce165f859ce3c947f9a6a890aaa

    SHA512

    ae07f31c71f4a26dece8d204e7ac94223f7761162b04eaa0231372fcffd9b8cfa4bc7d742b6a145d4410c57b41a589b474e60119c2a9f6d46d8767defea752c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c6de2ed5e4b628e807854a907094cb0

    SHA1

    e2f29a3c513b8ea6c2fb17dbcc01c5b71f2cf408

    SHA256

    3e338140de61e2245f66307177622897ed2e32fd509844386c75264cb4d24457

    SHA512

    ef859598e7b15144455c28b117fbb2239c2c4f550097b5f5d203edea6f006b65a06779fffbc05be3a4f1c0867c16fe5bbab32a1a30ac202a8f74f63cba16b307

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acf4327d6e5a2791a821123409ae9d01

    SHA1

    dc4b32f960db2b85ff407b2773ad740521b3d095

    SHA256

    faa3bc8d402215de10c0340486cade2b155d958870421afcd47e13863a0b8f09

    SHA512

    981c9f4f41d9889194ddf37099d063583e235d88cd6b49c7875dfc49c964ed80bbe2dcebd0e1c82769fc11683e11b5052cefa52ef849f0c224d609659d2aeedd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    172ac3ab84145ed1940e4fe0c2689361

    SHA1

    2c195079fa89f89de2cfd54af42177ca0f9bfc4b

    SHA256

    e0780d4e93339a3b10dfc4e199c2db385421171b7d6b561aace7dcc7655dfef6

    SHA512

    15daa6a6a4f1815f015f9e4780146754ebfc189c5661781bd47f8217f56be2f1816a2858358281f55782e5cd2d61fedaea2da7314654385d12530e7ff17f7c5a

  • C:\Users\Admin\AppData\Local\Temp\Cab539F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar53C1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2612-4-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-7-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-2-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-6-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-8-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-9-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-10-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-15-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2612-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2768-5-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2812-12-0x0000000000060000-0x000000000011B000-memory.dmp

    Filesize

    748KB