Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe
-
Size
591KB
-
MD5
a3c8187f395644a06b5799f663b2e578
-
SHA1
d8a91684a028e2850d5bf93f60533a73bea7bd8d
-
SHA256
19c11a89f8441372e42bc3e1687725808c1246069515efb403cf2e4de8b17470
-
SHA512
0787d6dff711174242951a6e13bbd589d8237723d1c03b460234a65e327929e9b5295ac18e88ad1fe245f41b1a98001afc1f73aaab4bcbe81204b9d51ef4597b
-
SSDEEP
12288:jZrhnSAfhz0YWEWC0EDPqF0fCPzENANp6VRIxRzqJAyRaj8b/ZLlEMSfGeNK:jZrhSA502WkPqaqPzXNYfIfzCA8q8tGI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2432-17-0x0000000000400000-0x00000000005EE000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 2528 2432 a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{072D04F1-AC2F-11EF-833B-EE9D5ADBD8E3} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438812213" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2528 2432 a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2528 2432 a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2528 2432 a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2528 2432 a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe 31 PID 2432 wrote to memory of 2528 2432 a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2560 2528 IEXPLORE.EXE 32 PID 2528 wrote to memory of 2560 2528 IEXPLORE.EXE 32 PID 2528 wrote to memory of 2560 2528 IEXPLORE.EXE 32 PID 2528 wrote to memory of 2560 2528 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3c8187f395644a06b5799f663b2e578_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40d2c8a7704a5c93f343b6af29a9b07
SHA136aeffa4665070df50b3fd41c8476f6078231592
SHA256011104b934f7c161124468e324ebd5c64a1f4230d291b840a3adccc53327c1b0
SHA512e7b9ef28ab22b2cf9e10f1551b2bd2bc258d3c0d65941cadb98f12e1c098f993d1ce261daed10c5da6fd53c4b29db6da17a7a957b9e988279b0feec040de4dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce9563db425d7ea604130f29dac2aec9
SHA1b1b510037ef01ab125b9dfb77194e4a95c6a61ad
SHA256e1f578080e1c8d792ecfd243e08fc8522fed54557b12c982fcaaa55021c53f14
SHA51291441a91d30a5f9312e6f6f8f77d21634aa783b4e8d63f701140bba20a4f11e788297c2e267dc2d735a43014a79351b36ee509a5c07a6d34131cfd8332edb240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53699e31ddf28ab22b05b8e37b118807a
SHA1d8532bb93f088f5f2b50974281a2fa59ecc3c9c8
SHA256dcb374a6dd7428e94b8578f126b2da9ef88a19746a5037c949d980d4dd44bb93
SHA512b2e6bb991adaa51e6ee2acfc38f279c071e998148d20b2fea6ba48389c53f3bd52bb187047c8e88c74b484d2f065c22a478cef4b93e78d9bd1f95b136d5afb06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c3357967414c4b7ac7f2a7538506cf
SHA1dd5343a0e7192d48a1bc5457a9dfefc6e2a0355d
SHA2567cb7a05dbe83370101e198d876caad4fe660f7741cbf8061532a1143237720ae
SHA51274b4692b9bd976a3f2f854eceaa10645b3fa8f8b596153c10eb0c7809107c46f717974cdaa8437db2b0ce9b6f807f687713805b87cc1eec9676762dcaded37e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617be9d0391f3b38a11decf81bc31dd0
SHA19fdab4b749b9af8e5d49a3fd5a904645fea9ffbf
SHA256b85eff866c4f10bb63bfe1da505ef5479f1360200be70c21e743ac47de82be79
SHA5124db8bd5168e471b217c6544ffc8e31351632a59a950b00038baeeb07f9f9299937184430fe13be1f8598f2846d5d2148046e4174323b9d788a088f985357f625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d63458664fd693a084ee43a546ac0016
SHA1ef8b1293db8ac417024a14ed4f10ae5038593c10
SHA25653d30dfb5180ad6e12229bde81b1505dd68844cac3604f4a4e3f93764119f9c1
SHA5126f5a2af04d8a628f70f8a8482808a292e15444094def1afb9cca0f7e3628d74a48981540620dd2f736b71a604a3d185bcd41e27144094a920d2a0b99cf7f6c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52307cc44c2bc946362494e35e5b7b43c
SHA1418310ebc99961b96432a517e76c06809534e44b
SHA256b991322e8a97f6918d36a1669ef3c9ddd0566aa197fb4407688a08892a3f2add
SHA5120581263aab9f4460bac8f65e4d379fc38763c66a300c54676794eb6eb6b24da730fba31fc2e1e7fad7c96e2151f9e1b72d547eaa7ae9636a2f015110090e10ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593e2b3b3afa2a47d8c53f3ba81994158
SHA154d5d40dd02cfd1dcdc221beb945dc42bdd0c964
SHA25646e62836fdb552da61c8680512de81aa6417594002fd1b89cfb0bd755056dd63
SHA512829d3b15694b1d4194500eddf6363f3b49a8fc84d42af64e0ee197f3640fc0f36a351bf8dcc93d12369aef7037302907d572c70195551e1a78ed0414113f98fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513700a5cd2860d9115508596b1b1e728
SHA196d02b13e605a73a4231fe6cca6819d57306779b
SHA256de7ee5cef90f987eaeaadc350cf723e6d47f653e27433d2472cecb3e4133e502
SHA512e4042c66e8590edf490bee5a522f31b8f425e5b8adc10636d0ef74dd74466cc89a362572a410a0711e54592b5cc72e67b0f38318f775408b831a62658c01e729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752fb5024700013c96d4221034f7b389
SHA13f28696383a907bf1f7cdcf8e650520fe4d51e22
SHA2560a0eeb5e662c2005382c13296ea74bfc67a4fd1a469674a8050c619b842db64a
SHA512b0a09d72bc5d8c4326200a7f3723b990d23558212c77bb3c8f079a5614cc9f49f9349b1aa2a7790619e746202cc4f0245b75e2e4648f69bb29003965ea651e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d538e13bfb87ba86276147b29b5cbb2
SHA19e723f10098e69939e47974d69bef1774db186ea
SHA2561b000bd3045dae34ccfb490812531f6deaec676d49f0bd39d52e439d89a6db4b
SHA512cc32efd43772158155fc7f6f6035b09fd49d21f0c7aa1253a7aa2d24b7cdfe1f4b744f40d1c6b942ed2e2214df55a108f9f8e6bc7097c8ceff01806fa8f40267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f2465aa1cb1c1361264a284a33740a
SHA1d2c48f59fa01ac77f6ce0af82760e1cc2e237c86
SHA256a99b0499f30a51f1fdd05da762a27b382d1fd8cef1b7f58e658600c52fae00fb
SHA512727f1851fd7e05921edd64e91304b6b89100b9b359a0abfe6b6737d4c85190c64695ad7be3b8e2bf7de7aa019c8f4ba3e22389f59c1138a814e7bdd393d93942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a782dc5634f7330eae824a699de4d7f
SHA1746d5657cd03b5545b20834470e271cf87231e14
SHA256dac6813f6b28595e9b1188233c695d34a2be150613983ef2e624e381a370664d
SHA512e9f9f4b3209775d86aab08c64cc27d7481daf888bb33fd01e0717ca66f5d8173c25db622a9ccad0c3eb68d4afaf65b1ffbef09b9f903df8190c3aed86269d3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e851ec343a3891aac0a2c8b083bf712
SHA1af60b8b293cc00acf1f79a5f14d5447d4962452c
SHA256f71b49ab673d5750384ebed64f7c972c956d0cf7cd7d74e0620255ea352dd9c6
SHA512b56fe903c2e123ba7dd069b4b7004d9052bea4050f4531859f5d4cbbf1c3b2eef616be4d4886cf166d430393de3cfae917564ecfe10a3c17fa23cef2758a115e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50814d3b844ca19ce19d6dd1cf83c9f26
SHA13ff57060d4624836a35098f885f8e4bbd39e78e8
SHA25634ff9392f454a58e594aad4db14a19ef9f188f3bb7f8f0502d5383f2836435df
SHA5123ba5d028441560ecbed2640f92f9a2e9a856cd12e3f0deb722623bdf6ecfa615cf3ca060a3f028962cc55e92db44d82b5285395894ec64b936880a46e0653529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718310985c5ebfc37355ff5c1b13528d
SHA1151986187d581b35294c5aefa9f1f84d8959fd8d
SHA2562faa79f00defeb0712088f1a64775bfae42a9c548bba89fba620e430f83a6dfe
SHA512b985119390fb8d6967e4885a5b4b40d1206988401f1d057a9ebf1ce281c28a65d8dfed12e66b8f6ee9fc1b6619731d3b3b15c8e65788c75d720afda3f9c8b148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811b018373905bcc076f140ecb234398
SHA1ee2be37532f65f6e58d6cc6df890d44935bc022c
SHA256736385e0ed45d92758cdba3af3838cb83077578454d095c08504fdd05c75760f
SHA51257c9f36cb9f8c047764c5e57e5be84ecb0f86ab6ca699aff073af34cc76a4169e7a4c6861f6890dc33c3106868de2aeba0c272237dfb27ede544f44b9fe697be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6e40393c4bc30e52c8d64a42c1881d
SHA16347d9925e8dff63ceccec111c5f11296715cb61
SHA25675c22ad2fb2e2753c0b0dc4abf7f542c5bb512a98bbb9ecbc8a6db8675c85969
SHA512d00c74f73074f2f5857a08efa4a0b711962aa2eccd17818ac492bc9c56902b63ee18c7bf1c064f009036674d02ea65aaf6dfbc9f3334ee21d7ffbb55b6c44552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c64ea1da40526967e236486a6f0a390
SHA10f948df311ab7db79b964c0d897daf151f9cae72
SHA25607ca7df695ad5e73ff4c04c64fe47408bf5f0a560fdc9686385c8f17365ee003
SHA51286bcd3ce94b0d9209be3a68646c850360add0872471c421cbfdc82ceabdfbb2cf0fe097d823c8130cb0ab51f9421ddb83d924939341c5b3baee1dac0efb39223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aebfa167696f16f4e481323f3d27cce4
SHA1fe3e61fe6828ce4b03036c129c85c1805701fee5
SHA256c6129778ecca5e9667f1b6cfa87fda75b856572eac6cf005542136a5a2005878
SHA5120c481b206fc88efb8e9475ed7362abc99a102e31184af77c0cb2a1b4523f8eb198ca55e7df304aa67b0b773668107e868383d7c941076c2e8199d30947f7d38e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b