Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe
-
Size
275KB
-
MD5
8ffc9df488742d2373b1287875bca013
-
SHA1
4e3ef589433d6ac73a165d545df8df158d425891
-
SHA256
14b303c0e637dd992c2757ffe3680893934583d731c188df47856843eebf2ab0
-
SHA512
a6c22e1dc97bb48845a4ecdd18912f0a6fc9005625fef808b56077e6938db4e231425b3583a6bb6c6821eb6a690d7f8be7b242654905a1e473ba50476009e859
-
SSDEEP
6144:3CG8HgpcUZnNwqg/6xqzzVd3kX7VGoJ0uuMvSFH/ieJ95TL+O8Bda:3CG8H4jZndgiEzxd3MVGoJpvK9pW3
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/784-2-0x0000000000400000-0x00000000004FA000-memory.dmp modiloader_stage2 behavioral1/memory/784-6-0x0000000000400000-0x00000000004FA000-memory.dmp modiloader_stage2 -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\FieleWay.txt 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 784 set thread context of 2772 784 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438548437" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E03F31F1-A9C8-11EF-B961-D22B03723C32} = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 784 wrote to memory of 2772 784 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe 31 PID 784 wrote to memory of 2772 784 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe 31 PID 784 wrote to memory of 2772 784 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe 31 PID 784 wrote to memory of 2772 784 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe 31 PID 784 wrote to memory of 2772 784 8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe 31 PID 2772 wrote to memory of 2144 2772 IEXPLORE.EXE 32 PID 2772 wrote to memory of 2144 2772 IEXPLORE.EXE 32 PID 2772 wrote to memory of 2144 2772 IEXPLORE.EXE 32 PID 2772 wrote to memory of 2144 2772 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ffc9df488742d2373b1287875bca013_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0b24ae305048ea820f1904a069e6c2
SHA1fe21b3da8ea294453be1374f9e2edc30a26cdfd0
SHA256ae96361e3b56ed51d7b618871bb253f6cd4680f8bbe918c2c86c7c8ba7999855
SHA5122a9c15a9b180081e9e6c7fea16f9e6915a5ac505a10d4d3adeb8f7f6d5c7558ffa649f59b087034a60613faf315b96bbaf556f60d224250d93ce9864b3cfabca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da4901e727a14619b10b1379d3c8458
SHA16a33b55f01e6f1719904155e872ec5c720aee8ce
SHA2561b9f69069faef800a71e5de877449d511085722502ba368bf824a1338a96d955
SHA512abf5383e412037f499509430906cf58c7da8b076d5191a2468677da8ee0b192eff1325e69e5b92bf8ca7e3de7196e36504b9cc249fce986f91dea6c7d9612ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e26278a40bf53ff1228b21992794ea8
SHA14e6612dc712660d78cbc97032cc19c6e820bd8aa
SHA256244acc80a92cb7e5c9c189397c5f7b654d4f48f6114e670c7eda4e1e5a49e599
SHA512c020b54ff4056d0b21ae500643a17f4b177f22c73a6b5a4e977cb6c199eaf52f0043fb7837c0cd37df24802668b3f9471995b2db015f3d44df3fe389c6c61925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5180c2da5c8fcd9ca43a89ee75006c
SHA14e42ea14e14061d3ba82ef5d7fa7af259e46ceec
SHA256f508a43f2a491a29848ca5311d92cc8733681e38d6ee0abd82bad0e89a9805d1
SHA5120e52b3278035dc98501fb6665785613fb30b3753ac7e712fb4db32cab009de1638b2e3859e5f13892799d52f1f8b6410bfacefe19b5df27877791b84ed7c4575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61e4dc48d36bf6fc4b0087ba4649c29
SHA184470be86cc26e4ae10214fb390ec09ba21d70f9
SHA256e9d94d00a0965799628bec9650ed5a8ef63448c8e35cf11c343f5467ef908d37
SHA512e76bfcb39eef4f92b2ddab0b139f7cfc5943800ca138670973e8b3191903a11f977ed97bca08469834dbc344a75fb1dfb8b05f899188496ee5127c2615f1d307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb21713fba5cd9c4ecee7cf53f8e4d06
SHA1ff16ed265ade6b0c5edbebfc0c230894546bc049
SHA2561a34459fb081c6af829a3cdfc336aae48556845711adf1755ab63e2ef661b6b0
SHA512178b12e0a56179913a3107f9e72c42e9704cb09c581597e05e8f261e94ae0a7e7aed97b44aea05e895628284204ae94673e0bcc1a832a2064c0aac48d747b753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ce2e735de3e18846a2730592599df0
SHA1115e70d8ddfd1f557e1795304449cb354fb9570e
SHA25600c93585b43c95e9e4fdc20248b27e553cb8a49b11b3775c6536303e689f00dc
SHA512aef8a7cad17031abcfa486e817771b19ba55ea88b60d832afe6f307262ee6fca5587a1379aa2eaaf91f3ff1f05ecc374ac057b6ac8244b1ac39fe3c28b5b75f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8584e7cb454b9158baa08dc59bec593
SHA1eeef54d4d25df5730f144dd56d6187c89161a590
SHA2569f5e184828e8eff61753283922a267a94169f985e71d5a3b2bc652d097eeb0e9
SHA51273686c782503de0acd205478294fe1c07f2229ee2f5ef93e8e16fc30b52513bcbc7fceea238e6bb0eb7cdf62595a88dd6b480bd20d1534c83f0b5814ec3d66b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0beb212dff86e2660046fa5075ad825
SHA1f1e53dd21f8d05f789f2b04711adfc06d2375c3a
SHA256d8e2b5aff304dc46784b67e7a0bf4b4223e096861203a434ad829f77cfa7ce02
SHA512962d990612210bf2024537da8533ce2e6144a740f4a357eb87ed71747967b79a9812a9ac8788a07ebe4bcd4b29a6dea0502b4b3c0f2a653c3bdd2e91d3808c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d15aed47c7ca7f3ad1c6e4572a97822
SHA17a773b181a11618c64162db43f20c7b0b2f8545f
SHA2562bff486b2f3f3fd793cd171337a912e87efdc8cc255ca31a470735d01c56399d
SHA51229205cd2f3820ec8a643dc4f9f65a23e18700e89ff023a46c829733d2d5d17110e37497ed6b27f358bd081ab61e6b84e67c35f1e067d833dcfeb130872f94856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7a8822d77fabe6006084bbdef25fdc
SHA159f2bb3ce0be95452842c4572111dc2ad53aab66
SHA256231a6c1332ae9032a033d516ceb8664237ba098580ca41b908ad7f099b006b37
SHA5129fed80c88686bf0fce6c976253bface15be18dfbe4e304b33cdc3b37c9722313fcf0ae03f5f844fc7b6a93c5571e02748354a7b4942ba7af181a01f7bec8fed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50349179544b490380b458a0834fecf64
SHA145f94411f3317a80607e791c59ce143a2356cf0f
SHA256ce98b7c43ae1049b983b17f85011a7b08a84198e066093fc42c9d05716bf981a
SHA5128905ce8672eb2045e365ac9ce080dcda26fa57d5f0f826b88c539cc5d79cf1b1785c11a6799a7893c5debc4663d43bac889bd4ae6a01d40d912206dfe72f0ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4d6120ea1514c13b2581360478a717
SHA11df86b2b73ee5364e74b7e212e1d30e429e3cc99
SHA256b837f5167e4ccee8cdca54e4b3af5e2b7c638d94be1afcdc7afd9e816fa101af
SHA51223314addd1d5f1faed52bc1456322959f9cc44b392c333c68c07fcf92d3308c2086d57cf140bae99f94cca5a4750f3294d77e1826c09ecb549cc30a2b7c8193d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa92643dedee566d5a1d7e128c25e114
SHA1120f248d1f7c7bc678d4da648157d27070d50898
SHA256fc6e32a7e5e40400d4b768fe05ebd5c85bd1b832234cbd6b5d9549868b96b724
SHA5125e9a39060453c347024162246f725a1011c6b401d506f3bab22095c823a863a7f618cae04bc5376b58c806b6a710bce760e196cadb05d74ee362815c8b549578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7484cc4cf113388a4bdefe766976f1b
SHA149d74b77bdf1825b9275ce0885577c4aa14e3e48
SHA256157d2650dd506f97bbaeeb418b03fb7b3143dcadc29b7b55aaaf4f3aa73589a6
SHA512e1e9dc5764297713eba678d2fb720ae50fd5466137b0ed1b1a7a56e11e7aa8a70c93a4f65a4b9b79104ba0415f508574a9d92cd7a86ecc54b2ddd2fde5dbdf04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598246f56dc6e0dc98275353e3f8f5e99
SHA1c576a993ff89f1d2b81e19945c264c3bf1c48783
SHA2563062c6ab8c45924026b8d6a62b788db49e76c43c059e5be5c41d58749ab08fb1
SHA512d1806d1bdb8bc2c8baf80cd6fff1a9c0ad5e0cadbef0049348a84994d6abff5e3e0769ce2e1895245c50de8fb6db335a84c0f356ad108dcf11f624d6389ca84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a590ed459c36dca5c94ab4e11f8e1a5
SHA178d9e6a37975844b6911e009456474c2d7359474
SHA256c3370dc36ab85c77ea4b6133e645003efaa84ee43dc7081ba650ccec5b3fe0a3
SHA5129be4fc28adf562f7cece234eedb19cfe4fc09b4e1444ab053d1ec4542e61c27f08c88e53741546894d9d718221b43d2bf1aa534bf8985dee4ad18490a2daf968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207bee6a458cf6a0282bd5a213610938
SHA1c754e0377fb62217bac35b80e3fa8b6c7b928545
SHA25686516317b674e7fd05c3cacd52e79bd3af4e9ac64aea89d8da76d8ea0105164a
SHA5120919ca0ddab3df031d9b9768ad733868b143a1deedde3abe2773164fdcc96f85fa412c2637aa80e6c1a2df1e384a549648c63eff82ba03d27935ee94411c041f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b