Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2024, 19:45

General

  • Target

    a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe

  • Size

    591KB

  • MD5

    a3c8187f395644a06b5799f663b2e578

  • SHA1

    d8a91684a028e2850d5bf93f60533a73bea7bd8d

  • SHA256

    19c11a89f8441372e42bc3e1687725808c1246069515efb403cf2e4de8b17470

  • SHA512

    0787d6dff711174242951a6e13bbd589d8237723d1c03b460234a65e327929e9b5295ac18e88ad1fe245f41b1a98001afc1f73aaab4bcbe81204b9d51ef4597b

  • SSDEEP

    12288:jZrhnSAfhz0YWEWC0EDPqF0fCPzENANp6VRIxRzqJAyRaj8b/ZLlEMSfGeNK:jZrhSA502WkPqaqPzXNYfIfzCA8q8tGI

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a40d2c8a7704a5c93f343b6af29a9b07

    SHA1

    36aeffa4665070df50b3fd41c8476f6078231592

    SHA256

    011104b934f7c161124468e324ebd5c64a1f4230d291b840a3adccc53327c1b0

    SHA512

    e7b9ef28ab22b2cf9e10f1551b2bd2bc258d3c0d65941cadb98f12e1c098f993d1ce261daed10c5da6fd53c4b29db6da17a7a957b9e988279b0feec040de4dee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce9563db425d7ea604130f29dac2aec9

    SHA1

    b1b510037ef01ab125b9dfb77194e4a95c6a61ad

    SHA256

    e1f578080e1c8d792ecfd243e08fc8522fed54557b12c982fcaaa55021c53f14

    SHA512

    91441a91d30a5f9312e6f6f8f77d21634aa783b4e8d63f701140bba20a4f11e788297c2e267dc2d735a43014a79351b36ee509a5c07a6d34131cfd8332edb240

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3699e31ddf28ab22b05b8e37b118807a

    SHA1

    d8532bb93f088f5f2b50974281a2fa59ecc3c9c8

    SHA256

    dcb374a6dd7428e94b8578f126b2da9ef88a19746a5037c949d980d4dd44bb93

    SHA512

    b2e6bb991adaa51e6ee2acfc38f279c071e998148d20b2fea6ba48389c53f3bd52bb187047c8e88c74b484d2f065c22a478cef4b93e78d9bd1f95b136d5afb06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77c3357967414c4b7ac7f2a7538506cf

    SHA1

    dd5343a0e7192d48a1bc5457a9dfefc6e2a0355d

    SHA256

    7cb7a05dbe83370101e198d876caad4fe660f7741cbf8061532a1143237720ae

    SHA512

    74b4692b9bd976a3f2f854eceaa10645b3fa8f8b596153c10eb0c7809107c46f717974cdaa8437db2b0ce9b6f807f687713805b87cc1eec9676762dcaded37e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    617be9d0391f3b38a11decf81bc31dd0

    SHA1

    9fdab4b749b9af8e5d49a3fd5a904645fea9ffbf

    SHA256

    b85eff866c4f10bb63bfe1da505ef5479f1360200be70c21e743ac47de82be79

    SHA512

    4db8bd5168e471b217c6544ffc8e31351632a59a950b00038baeeb07f9f9299937184430fe13be1f8598f2846d5d2148046e4174323b9d788a088f985357f625

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d63458664fd693a084ee43a546ac0016

    SHA1

    ef8b1293db8ac417024a14ed4f10ae5038593c10

    SHA256

    53d30dfb5180ad6e12229bde81b1505dd68844cac3604f4a4e3f93764119f9c1

    SHA512

    6f5a2af04d8a628f70f8a8482808a292e15444094def1afb9cca0f7e3628d74a48981540620dd2f736b71a604a3d185bcd41e27144094a920d2a0b99cf7f6c90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2307cc44c2bc946362494e35e5b7b43c

    SHA1

    418310ebc99961b96432a517e76c06809534e44b

    SHA256

    b991322e8a97f6918d36a1669ef3c9ddd0566aa197fb4407688a08892a3f2add

    SHA512

    0581263aab9f4460bac8f65e4d379fc38763c66a300c54676794eb6eb6b24da730fba31fc2e1e7fad7c96e2151f9e1b72d547eaa7ae9636a2f015110090e10ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    93e2b3b3afa2a47d8c53f3ba81994158

    SHA1

    54d5d40dd02cfd1dcdc221beb945dc42bdd0c964

    SHA256

    46e62836fdb552da61c8680512de81aa6417594002fd1b89cfb0bd755056dd63

    SHA512

    829d3b15694b1d4194500eddf6363f3b49a8fc84d42af64e0ee197f3640fc0f36a351bf8dcc93d12369aef7037302907d572c70195551e1a78ed0414113f98fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13700a5cd2860d9115508596b1b1e728

    SHA1

    96d02b13e605a73a4231fe6cca6819d57306779b

    SHA256

    de7ee5cef90f987eaeaadc350cf723e6d47f653e27433d2472cecb3e4133e502

    SHA512

    e4042c66e8590edf490bee5a522f31b8f425e5b8adc10636d0ef74dd74466cc89a362572a410a0711e54592b5cc72e67b0f38318f775408b831a62658c01e729

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    752fb5024700013c96d4221034f7b389

    SHA1

    3f28696383a907bf1f7cdcf8e650520fe4d51e22

    SHA256

    0a0eeb5e662c2005382c13296ea74bfc67a4fd1a469674a8050c619b842db64a

    SHA512

    b0a09d72bc5d8c4326200a7f3723b990d23558212c77bb3c8f079a5614cc9f49f9349b1aa2a7790619e746202cc4f0245b75e2e4648f69bb29003965ea651e3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d538e13bfb87ba86276147b29b5cbb2

    SHA1

    9e723f10098e69939e47974d69bef1774db186ea

    SHA256

    1b000bd3045dae34ccfb490812531f6deaec676d49f0bd39d52e439d89a6db4b

    SHA512

    cc32efd43772158155fc7f6f6035b09fd49d21f0c7aa1253a7aa2d24b7cdfe1f4b744f40d1c6b942ed2e2214df55a108f9f8e6bc7097c8ceff01806fa8f40267

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21f2465aa1cb1c1361264a284a33740a

    SHA1

    d2c48f59fa01ac77f6ce0af82760e1cc2e237c86

    SHA256

    a99b0499f30a51f1fdd05da762a27b382d1fd8cef1b7f58e658600c52fae00fb

    SHA512

    727f1851fd7e05921edd64e91304b6b89100b9b359a0abfe6b6737d4c85190c64695ad7be3b8e2bf7de7aa019c8f4ba3e22389f59c1138a814e7bdd393d93942

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a782dc5634f7330eae824a699de4d7f

    SHA1

    746d5657cd03b5545b20834470e271cf87231e14

    SHA256

    dac6813f6b28595e9b1188233c695d34a2be150613983ef2e624e381a370664d

    SHA512

    e9f9f4b3209775d86aab08c64cc27d7481daf888bb33fd01e0717ca66f5d8173c25db622a9ccad0c3eb68d4afaf65b1ffbef09b9f903df8190c3aed86269d3af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e851ec343a3891aac0a2c8b083bf712

    SHA1

    af60b8b293cc00acf1f79a5f14d5447d4962452c

    SHA256

    f71b49ab673d5750384ebed64f7c972c956d0cf7cd7d74e0620255ea352dd9c6

    SHA512

    b56fe903c2e123ba7dd069b4b7004d9052bea4050f4531859f5d4cbbf1c3b2eef616be4d4886cf166d430393de3cfae917564ecfe10a3c17fa23cef2758a115e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0814d3b844ca19ce19d6dd1cf83c9f26

    SHA1

    3ff57060d4624836a35098f885f8e4bbd39e78e8

    SHA256

    34ff9392f454a58e594aad4db14a19ef9f188f3bb7f8f0502d5383f2836435df

    SHA512

    3ba5d028441560ecbed2640f92f9a2e9a856cd12e3f0deb722623bdf6ecfa615cf3ca060a3f028962cc55e92db44d82b5285395894ec64b936880a46e0653529

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    718310985c5ebfc37355ff5c1b13528d

    SHA1

    151986187d581b35294c5aefa9f1f84d8959fd8d

    SHA256

    2faa79f00defeb0712088f1a64775bfae42a9c548bba89fba620e430f83a6dfe

    SHA512

    b985119390fb8d6967e4885a5b4b40d1206988401f1d057a9ebf1ce281c28a65d8dfed12e66b8f6ee9fc1b6619731d3b3b15c8e65788c75d720afda3f9c8b148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    811b018373905bcc076f140ecb234398

    SHA1

    ee2be37532f65f6e58d6cc6df890d44935bc022c

    SHA256

    736385e0ed45d92758cdba3af3838cb83077578454d095c08504fdd05c75760f

    SHA512

    57c9f36cb9f8c047764c5e57e5be84ecb0f86ab6ca699aff073af34cc76a4169e7a4c6861f6890dc33c3106868de2aeba0c272237dfb27ede544f44b9fe697be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca6e40393c4bc30e52c8d64a42c1881d

    SHA1

    6347d9925e8dff63ceccec111c5f11296715cb61

    SHA256

    75c22ad2fb2e2753c0b0dc4abf7f542c5bb512a98bbb9ecbc8a6db8675c85969

    SHA512

    d00c74f73074f2f5857a08efa4a0b711962aa2eccd17818ac492bc9c56902b63ee18c7bf1c064f009036674d02ea65aaf6dfbc9f3334ee21d7ffbb55b6c44552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c64ea1da40526967e236486a6f0a390

    SHA1

    0f948df311ab7db79b964c0d897daf151f9cae72

    SHA256

    07ca7df695ad5e73ff4c04c64fe47408bf5f0a560fdc9686385c8f17365ee003

    SHA512

    86bcd3ce94b0d9209be3a68646c850360add0872471c421cbfdc82ceabdfbb2cf0fe097d823c8130cb0ab51f9421ddb83d924939341c5b3baee1dac0efb39223

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aebfa167696f16f4e481323f3d27cce4

    SHA1

    fe3e61fe6828ce4b03036c129c85c1805701fee5

    SHA256

    c6129778ecca5e9667f1b6cfa87fda75b856572eac6cf005542136a5a2005878

    SHA512

    0c481b206fc88efb8e9475ed7362abc99a102e31184af77c0cb2a1b4523f8eb198ca55e7df304aa67b0b773668107e868383d7c941076c2e8199d30947f7d38e

  • C:\Users\Admin\AppData\Local\Temp\CabEEF4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEF74.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2432-6-0x0000000000670000-0x0000000000671000-memory.dmp

    Filesize

    4KB

  • memory/2432-13-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/2432-3-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/2432-4-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/2432-5-0x0000000000740000-0x0000000000741000-memory.dmp

    Filesize

    4KB

  • memory/2432-7-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB

  • memory/2432-8-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/2432-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2432-9-0x0000000000720000-0x0000000000721000-memory.dmp

    Filesize

    4KB

  • memory/2432-2-0x00000000006C0000-0x0000000000714000-memory.dmp

    Filesize

    336KB

  • memory/2432-0-0x0000000000400000-0x00000000005EE000-memory.dmp

    Filesize

    1.9MB

  • memory/2432-14-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2432-17-0x0000000000400000-0x00000000005EE000-memory.dmp

    Filesize

    1.9MB

  • memory/2432-18-0x00000000006C0000-0x0000000000714000-memory.dmp

    Filesize

    336KB

  • memory/2432-12-0x0000000003310000-0x0000000003311000-memory.dmp

    Filesize

    4KB

  • memory/2432-10-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/2432-11-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/2528-16-0x00000000002B0000-0x000000000049E000-memory.dmp

    Filesize

    1.9MB