Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe
-
Size
280KB
-
MD5
8e931fa2fd9391f9f25e17190620c708
-
SHA1
bee39b8e595811b8eb9c2f85f7f866ee2e94ab61
-
SHA256
bd5a31b5c236d773d269499dcaeb18bea722fb9c5d25d1d7034f44fa9f473ebe
-
SHA512
db357a36518d7ba6cc037be6ddd6864af0efed5e8cd93154531efea3d63887faf984ba5abb8ce1a06e1b81a213ee132b7ea9cb9b3c81044eefa87ff06f7e8a59
-
SSDEEP
6144:a0iQzrjVvPrFU85upquN0PrtXO4SIMRtZpL2pyR6dyHrs37Y5O:5iQPjVvjFnsF+PrI4LMzZpyQcdyi
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1952-2-0x0000000000400000-0x0000000000508000-memory.dmp modiloader_stage2 behavioral1/memory/1952-6-0x0000000000400000-0x0000000000508000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
Processes:
8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exedescription ioc Process File created C:\Windows\SysWOW64\SetupWay.txt 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exedescription pid Process procid_target PID 1952 set thread context of 1932 1952 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exeIEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436854664" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40E4FA21-9A61-11EF-A7C8-6EB28AAB65BF} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid Process 1932 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid Process 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exeIEXPLORE.EXEdescription pid Process procid_target PID 1952 wrote to memory of 1932 1952 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe 30 PID 1952 wrote to memory of 1932 1952 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe 30 PID 1952 wrote to memory of 1932 1952 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe 30 PID 1952 wrote to memory of 1932 1952 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe 30 PID 1952 wrote to memory of 1932 1952 8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe 30 PID 1932 wrote to memory of 1372 1932 IEXPLORE.EXE 31 PID 1932 wrote to memory of 1372 1932 IEXPLORE.EXE 31 PID 1932 wrote to memory of 1372 1932 IEXPLORE.EXE 31 PID 1932 wrote to memory of 1372 1932 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e931fa2fd9391f9f25e17190620c708_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e20c22144a7f7ef96dc4034a3bd539b
SHA10e092f54fc937789d471fcc6ac9cb0848319b019
SHA25648e9f4e57765e74f5058c5cf6fc6234abf45e0a1a1d7fc5b0011070a4fa907e2
SHA512cb90bb1037d09af28811f513286c214452c2ae7e9625ba6a4c30d97c74ec31c92afc3547e3510ebc6316e497ee4b32d2822076e88eb332757bd97530d4d2a13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538374757a37d46489fa307bd8db1cbd1
SHA18fc481b7adb7ae7d609815909ef0985ef38ee4e1
SHA256f3bcc50fdf660f18327c4763ef3705012cfc9da09e9b081976873baf297913b1
SHA51271b2c203024138ce82bec4677c4215d316a9f4c45954d6382780802ac819fc897b21995ecc282c7b81ec28d815853b862b36a126dab578ec97742777c1cc2b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589dfefb8185139deefa8509b9d9ab041
SHA1ed92e00b7b5cd6c26daa2dc6f30d7b7ce36b2546
SHA2567253ca60171e5a7b4f63dbfbcd39547c8a6325edf0feac0db0d9ab7cc861f72e
SHA51237921b40847ca9e5bb1a543c1668872a190ec1eda1f23a1d77376b13337e56bd146755d5776f70f9713154ed3ba656aa9abc36cd80848b5401183c3f92b3ee5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5179ba03e51449b1a9ad3fc1c3869fa42
SHA1463903aaff861dc6bf128d5dcf1f27440322a7a7
SHA2561f89dcdccb0688c0f8560309b70c47a0987ed97f136960ded0c070be05192714
SHA512d6274f88302995739bd35e92cd58e0dbc623db585cbf59ff8991d0037f769b47e9391db117482837b61fbd19076575cdf5402f169341e1227dd00d6afec6dc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed30ffdb58cacc09123f86de19fd939
SHA1013bba7ba9380bf8d4e854703ed11b0431e20c62
SHA2567bd30e184ca5a1857f9bd7d322d816aa201395f4e0224554844a3dd82fced169
SHA5121b482c9f926ed4e7e5750a33c2f24e34913f571e6c86bf23e01c50dbc079004eb27085511dc2bd1dc62a014f5d8c5a9b75894a0df3761a37ab97a7a359bdbf50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd7af98372c416b841904b6c18627b6
SHA1946d1561726971bb0d0e62dbcdfa70ac48f9c974
SHA256327db154a1b33a09b957bbe53ba92de437d12ad89fb2b78f8f6c3dcdeffa3fbc
SHA512180e94f59fed5bec91abd0925f19e43aef058fb8c07845bfefee21436b86f92f340264df21571d5e3f7768cd076f374ed3d4b3a338d3a710444cbbca46e508e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539536dae5fe7ec511310e7cf5e42e5e6
SHA1327bc7d22d683b9fca18917cdc37883b78197d20
SHA2561ec240821b8c0797de82c422c78725d5440be7a3a54604a0da38ab070e08830b
SHA5125d1e751b61abb184b01b38981995425b89b78f7139e274db2c67847fdf209d76f356b37edb10c9764e205ea88fd72f883ccda89a07934c6f69f519a3af49f284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ac409aa7cedd9fc7d459ec686d47470
SHA15439b2bd9e1d8a3eef19b1e2ffeac54b2960a9b3
SHA256ae464779710b1e6bb61e63ed423fb94a798f014e4064bf6511bd3ca0560455c0
SHA51224f94569046f8a464e67ba0675d6791d02b9946b453a757a265451a7547cccba0c00d6f4a92d26404f249a161e57f10d85a0c4c6af00c70e6a9bb5e0546310b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc021ccc7b20f0ee9c9dde772527a972
SHA1f45a798a5a26c4657b44aa6070450d6f6e535ecf
SHA2566f651177d8b15786da5f91d24361d8d5831c28a793718e030ab7c9e8b521e70d
SHA5124281182825dd04fc81e5a9739cf95ed68216f1b1bb5753536064dc0fd5585f57a66821153537bd0bf9693bb3fff02afc105d4cc9c735734203f468a590684f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58899cd43a45d52e4f4e2a343d35af6d9
SHA1399954fd6a51f412163feb638912e63d3e8b5bf8
SHA256d772c9ca1a2277e7fc2235e3db993a262032b10809691794d6b6e543eb79e7f1
SHA5129d23bd84ed7c514f5384b01db70ca108a02a216aba8534a73d4ff1497921fd6c62dbf5c2f4fe742104dba17c0229dc1647e7034dff64a33cfa9270b67b99d759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505148f83ff3518043c0ae48b68344542
SHA1091fbe46326ea1c7d24e4ec5955b0140de24bc0d
SHA256085eaf6acfcf5ad04f351dd238f89bd5307aea09abdafac805340c8cb82f2ca0
SHA51286da868521f29530364547fb5efd3d994333ceffd0c798636780275e954e8b3ca7a3f1c7df8426fa6eb549ce619eef95313d9f0a624dd46abb4a02bf817f0aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51540c93f4c84d25d065254832b020d16
SHA1e3699a06300cff1ccdf199b700a5fec7ff7d46e8
SHA2569d75bb2d74116f3962aaba7b43aedbed2c26a374013ed52caedd5d63836a69ed
SHA512e7dcb95017fcef43353a4483e89182bd2b2e31424791e7a2c55ee193733aaa90dd73d94191a9b4904c39a1412c63d71d53d078666d2eeac04e4358c9de1d9dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b28efd048c3321ef20af13196e93a6
SHA1a600bf7b0ffcacd6e536091b4d91146d370d9288
SHA2567888ab9e9297c1e3281d11da17fb271920f24b7c5059923becbbff16647a1867
SHA5129757dd2d39395dfe2109b78b70857d02ff0faf8b449f77d91452b7493eefe319b96c494e16192d0dae875c653627aadc6ed91983841893c1447485c26a2823c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527081e896568f10f6563c21abfd36493
SHA1dae4d7598a323b28088ea33ba6135e2cef85762b
SHA2565e7d02a424d7cc2f3112832e8f55da71949f66dca5f73c088e2ad6106f9edce5
SHA512f83e97af5de3e593aeb08635f505c0c6c30d63ab5ccff1444f3aa4dbe222f269c9768e64bd82a7b0e28708a9556c481a821c1ffd7e72fd5fdd068ca5c6aed9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5722f673d4281583da22946e725324
SHA1ccc84954225a1a7bcdbaff36f8d8e9d4ac2b2035
SHA2563de2a62757b66b1583c5f0b04d0cd3ab9ddcc584e7f764269054900dffc6067a
SHA51200601381680ccc8286f654da7b8239aecbfe00c8e4a6c7f5c81548f8b49f557f12cfc1bf3516ff693ef643fe144e5743c72bc056af24835225ad90b129cddcee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f68f4287356bd99a967d6f470e0cfc
SHA13fe2aea6006f9a9d983064d55b7128eb534d32e8
SHA2560653511460b59f1873dbb2c91ffb3721db2c2bd32ab84b49efcf5327c56a26a3
SHA512479ff96a8bf9ac1c7c2badfbdd10485a6c64c5759e031210f85da46a3d053d22f40d1030a026dd1abfb591ba8bad2bee1d732e0d0d12b6cc1b985ff58c1aec07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b41ffc0e2b98e9eae29772480797a6e
SHA10756ba3b3ca1f6535d19f20c6e3d1e32ae88b6a7
SHA25605056b48cdde0b8f3e3e24a6d874fe854d78fbdd070d50cda9d8c0e579c1c0ae
SHA51291160a7f17e01a250803d9fec5e9fd3c78dac1c6eb8e6c00c7184e43099912acba8ca0ce91a49c7e20f2e5c1b882337839405c2090992759b5a371614f39b861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5869b25517f1db702b455e3fc449492cc
SHA18c6c8c27b4ffb8ebcee624a11a4dad4fa7d9710d
SHA2567b03a7323171d640bcd73b739756668a011d854487d4c0ad53b89a4e562d8de8
SHA512b0fee53817eb88546307c7631e653ad064011721ba4c3265c9a0e7a3c2352e06146022a85d15f932bbe3f9d6e99b0ffd9607a09e65cd77be1e0983d2d4fc9f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e60d56c76547726c0af85f7a3638345
SHA1bd30687d7e1f2d6e3b507c92dc4647a146c2313d
SHA256f679c1535a18017c91193b3e19ffb8ebfaf242bb198054682656831889e21ab7
SHA512462879d045eba6058636fc35fbe440fcccf9c997341249eee4199b2c53ec32f24ed14c192322b8891e4cdc6a93e671d08b3b46c69feb0699434b138cb64a1f71
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b