Analysis

  • max time kernel
    67s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 20:20

General

  • Target

    8d51ddc3f9fba88099d44f2348cbbf84_JaffaCakes118.exe

  • Size

    756KB

  • MD5

    8d51ddc3f9fba88099d44f2348cbbf84

  • SHA1

    16cbed13ab627de63256ac12968a05e9625082ce

  • SHA256

    02b776f7f77068d998009d8e76e75602e737be9bf085a78d6aece0f6f366ab90

  • SHA512

    360c076541f5c54e82af4dd6ef5a31140c552e1133580c58af1accb37a74df334d04d01a7c3608440eeb914df314157cd4650264a66bbe5cc36469f924d24215

  • SSDEEP

    12288:Hc//////uaVfkX0OwJgKwo80VTTnqn8K16FmFaNblaUHOjoSZj/0e6GwFP/KcxJ4:Hc//////HFK0jCKl9O81siblYcSN0eF/

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d51ddc3f9fba88099d44f2348cbbf84_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d51ddc3f9fba88099d44f2348cbbf84_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\8d51ddc3f9fba88099d44f2348cbbf84_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\8d51ddc3f9fba88099d44f2348cbbf84_JaffaCakes118.exe
      2⤵
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    beb5abc6e700bafa3c8a6cbbebd29859

    SHA1

    24fe62041db48474f0a0d2ff94b4d2deb2450bbd

    SHA256

    dff2ae7861f9a8e746c1f0ff698417502dde1157a2ce1c1f51a744dd33a37d2e

    SHA512

    45dbc27f7bdac6a19a6039de24fdc2013a37b7af2bb2b22828195afac1b36ab5e1e41baab6f1ec48dde554d50980a21b86125a0d4c58a48f6329938affc204d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79d2282c8556562030bb33f47a01bd45

    SHA1

    d31fc7bfd8bc329f38a9b965bd85644428b6a443

    SHA256

    5a4d603bbbe555ac79dd9bbc16e69afd56ad87ced1b2d8070b6a1b7962b1933c

    SHA512

    7fba9e3d89a3d3b3caffc7b7a808fc71c4b5b9531edf3a4351504def54ba424af1b4e8cdb7f4610912acd4fa99ee011ba84768266fa2fb9865ea02976852ae37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bedf256879d9c430812bdffddc1efccb

    SHA1

    7622d1613659ae5c5a903505884a4b3d86262118

    SHA256

    666a86364b7fdba3033c9aee5a4099dbebd19bacc1b58cba6c97d78670dc05b8

    SHA512

    1a485cb1977b24ddea750fed3f420b599d9436bb399c84c4360965814974ec82778e0041ae3df56c4636a4c675c98e405246eb160c7946d3fbd236dcbb8c29cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04e3d161b68205dc86040dd8f3ec33c7

    SHA1

    823c1e1f041fb289cfebdf1927154ffb42de13cb

    SHA256

    17aa810d7b7e2755f31d9d1d85395cca86012577a6e5b01d7e526454b638b1bd

    SHA512

    6dbc573e3382b74f486ab095919f6d303ff95f0e02924cbf9d606b74a8a16781cfb5f1c6b9193313337d4916b00ec3b01c57e98affef6d7e25fd51dfe0f75ae3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c77ade56a63f7962a3262cd95a656551

    SHA1

    4b6e06bfbb57b439bf27ed18694464351c8c5355

    SHA256

    12d4879438bd29498334af5bf2f6de5fb943576365fee8d82b9b1c83eb00cc6a

    SHA512

    1852917e93edda6de91eab60ebf09ee9d09114847ec1f34eb8a6fb39e45580bbd78406a969d0569f6b239c7d77a35bf8ff4d7b0de5b023813ca1360dc14eacbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b1f1f4e1b757580575dd9e9960309cd

    SHA1

    8ff0c853cca864d4ea0390dc181740f56eb9c4f8

    SHA256

    4568713b9674b0df8e376b943c8e5c4ceb3cd4620e35ea05e347e7914a80a689

    SHA512

    43da6ec84a93fe410b15df477d9a077779cc089f2e1b3fe3c5c040636f85437afdd4fec3343a506842d907a137acf900dac54557ed8b6317619ead4312e1cb6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efbe57345f9705d352fe3e4c69a48291

    SHA1

    3eb111b3adbad03ff5873cfbcf3b1883c8fb7ba0

    SHA256

    81069abe1e34c22eeadcf8628127045abc8305881d93b6ee2dcf838959002b36

    SHA512

    eaeb564c11d6fe6ecb1bb1bc5440fd3dba04b45a097a774ab532bb6ed1443c84e7c17faf8227bdba7fbca33ae6d4a9061a6e3b76a8fa942c7c248d131e20d4f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a4acf1f57d87d2eca88a608ed2b517c

    SHA1

    06b51e0f734dd0c3303f56fe26bbb8be51234837

    SHA256

    1bb256b45d6c3b3022c0a5709cf114106f710f48df2e221744db45635963b9ca

    SHA512

    e83c9884d5a6c97e822dedb11ce0714e6d563829b47f7a1a51fb9ab870304eef1c148aae158d9ceb75181320dcdeae3f1b6de4dcff311cd8fa4331ab9f66dd40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1fee1320f3163bee35612e333b697a1

    SHA1

    969cfb7d3835fc8e05735f7e4bc62ade52c9bbff

    SHA256

    e9c74ab7d372abba7f4c0b05bb61f5aefd1eef3b52fb2ef79195cd4dc2ac25bf

    SHA512

    08ec6704abcb2b7af78156e9158f34475847b577dcf2458d83ce8df4e4881e30563d6842186b4276d82a7c2182b8d4f4b9851530809e581d7c37edb40e5cde52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ae6df6847d5dadf2da59b1a8f06bece

    SHA1

    151d1f337e37997e0b6350758a6d794306a28e76

    SHA256

    ee962b0096e8729c3a399f41a360a39df289e500f6f24c09e825ed533ec313c8

    SHA512

    224152729950a1f47327837b7d92b4f29650acef1b5d78aa6b3d627b140d1648bd8336212fe58bd4a204ea2cd9c5ec490fb7708c9497d2f8981133657171b3af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50ec5f06398ccbacb0ae9bc283d773cf

    SHA1

    f89b320f7e61f3f84d56e27cd93f0533723e0e9f

    SHA256

    4257e3058f6a9bd2676d9ea3c3887969c9c6e015dffcda16f7962c7c69eee4c4

    SHA512

    409acf1b97895c99776631cd45a0771f617e03000ce32aa4eedab859bf8d04407f611ce611f69107aac727c0ad934714373bc391020f0e15af5b22031165e462

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65adce5dad3dc98586a40c7f99824cca

    SHA1

    1b0d1aa3cbfa961edd62e6ca080ffe5607dd783e

    SHA256

    cbf9e0cd03d3edfd5018f6bc9ba960fbafc7008f8570a65709fcd69f0a12a140

    SHA512

    a3e34e84fd8bb17315f94adc902da1cff254d2f5cef485d2131e246dfb9b5dfe9585b315c1a965120cef0081eb3964b90c7c6dbae62cd638334e32de9ff5e87e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ad85544aec63943283a9ea924f9b0dd

    SHA1

    21c67c87bd4432527c181b7550eab62dd1255fc1

    SHA256

    d54f8e37d11db8fe3e32e50f862cf19d73c24bad4d7d419bd315d141a7ec6846

    SHA512

    7e3f5a6e0297a9d4f788110cd71f9b6ef2788862673bf4b0fa627a74dad8610b8d062dbded86c8b50f652ba97af448158acdc39b6f76daa0a49d743266fd9dfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0e7dba1236c3f226ecf28c49f61dc48

    SHA1

    d3a7a3f572667e95f3c5b9a0bf8a513eb4dff30c

    SHA256

    9c5c043c4bf588511507056ea5935e00cec98273f634345582eea84015c41360

    SHA512

    91d7a982143899eb8a3ed94ab4292f0a81ed1b34db435fe7bfb2f7ba92193a30852702ea6a38d517680ef7cc3ae5d1824352c429e8ba4229f25f78cc2a4bd923

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69ce5bd703ef9dc222462cf16ecf654b

    SHA1

    b40d8568c579a793bd81894ef464666666014b0c

    SHA256

    db73357cda178ab30d238560196055dd0d03cea572a13d5b1905f65e7907c3f1

    SHA512

    367b72c7a2d8db2572f67e8f35c26922b9982b14fb7201c1dc31e3328c174f8f1258df1f0e4dfd1a0a85b727a8ca2a5a9e74049bba57ec7961050ecd1f9f86c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e87af9065579f5db33665322d4e7258c

    SHA1

    2422235badcfe07ff8f21aebebe67e6d278985da

    SHA256

    1db3a5a5adefacf6bb0352ec051e7d407883f7fda993b4ab3c63717387a27705

    SHA512

    7a1879619a4eb5d578d9f8fbf1fbc0b93c086c38a6589d8cd74c6e30c9856b3d4f1d8908bea2458a609ec7164af613bd80999779a2897b5a9e2508fc7d442ff6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40ca2450d6261a54fd514627c6d95122

    SHA1

    51a32ea2594e534acf3d51404098ee3da50e1eb0

    SHA256

    15e1b825470a5a0961cd5e04ad86b8a5da14547e409b66580ccbd26b73d76c4e

    SHA512

    0e366af550f55c21537f91b5a44449956255a4f6ecac19e3a3c027973230df4399d0d8b11739b49fa310a00d57abccc5188258d06db53ab81b2ce524ef448d95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    838da3f290f0a111b74395b1f6afb058

    SHA1

    f1ec2db2e2d1f31ab9961b37f234a8e757c5d741

    SHA256

    9ca5e71992505381f7b6052ca8d449ecd35a6c0e9a58b5c74377a888ea2f8f2d

    SHA512

    e29ec053f92a744302a038ca5d58139cd03027318bc7e76c09358eb1d5a380baf86f47996c6a24f8c4e968278d4542d1e9bedf7eeffe277f8ede789e1c138df5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c62cfbbac4a1871fa0ed10de480a47f2

    SHA1

    25387d2778748bfe8e78c4531e6085fa4a550ec1

    SHA256

    faf460d293446ea397e352045c5b6274646705f21a7a048c89f6653e6f02465f

    SHA512

    b1bb0a2a57892e099316eb04a83429389d833e02cca84f4e92f9104ad2f462181e8c8a23c0c1efe10891c29da618d96ffde7cfb7232129acb493e63de74cc5dc

  • C:\Users\Admin\AppData\Local\Temp\Cab1DDF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1E50.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2140-3-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-7-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-4-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2140-8-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-10-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-9-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-13-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-14-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2268-6-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2752-12-0x00000000001D0000-0x0000000000291000-memory.dmp

    Filesize

    772KB