Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2024, 10:29

General

  • Target

    b0a492b7f4f39433b2279ec02dc9f4fd_JaffaCakes118.exe

  • Size

    407KB

  • MD5

    b0a492b7f4f39433b2279ec02dc9f4fd

  • SHA1

    cb78517d2e5e373be0b547f2d4d740dd1471430e

  • SHA256

    e59fa28c282dd2eb6b906e9aa0be9759a98fa273118bf3901e8724e17e0a8f64

  • SHA512

    b5622afa6b55bc89021ad0ec57172782454e896137cc21cd1c42b87a2ecd12debd119dca6c196e52c73846bbfffc4a31dcf6f7366d40c1ddde24dc1dffd26caa

  • SSDEEP

    12288:9/NgnKspPhSgqTl2Q1RoCQ+4dmbQIa4v+X6DIuBrU:9lgnHJhSgqTQKuC/4A5axCIuBY

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0a492b7f4f39433b2279ec02dc9f4fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b0a492b7f4f39433b2279ec02dc9f4fd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Users\Admin\AppData\Local\Temp\b0a492b7f4f39433b2279ec02dc9f4fd_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b0a492b7f4f39433b2279ec02dc9f4fd_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f008ed130a46d33488905b43e258bc5

    SHA1

    5c98f4eb0614696a548d6d4a80939ff24dc933e8

    SHA256

    d26f18f903c87dd8ba584c354791bb0455068aa1fc2bc961afa8d0d9d2b4d856

    SHA512

    f43359c5b44a86163dc272fef0edfab41499d1924a49aaadedabf9554c844fdf21d3ecbe6f3f05b4a6004f2c7fd9547b4fd741d5f9125651b4db0fc64d9b6262

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adce3dae1d57a26e135b2d0d62483c6e

    SHA1

    1f6ec4eff501d36247e2b4219ceaa808f78035c3

    SHA256

    dba7a8441dce239313fbbee1362f92c31617f51cf02145804665f3972a843b4d

    SHA512

    3927583e4d56c948b52a068de26be39142dc143c6b8f2d8e256b7908306254d6d892e9cd1fe61e5acb74ae5d4bc82ef0354190ee71094a4be0ff88a4773be3f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0def11eb50993e677cd27cb760c015e0

    SHA1

    f77f0df1fe418e3c3807c103137e489d14bd6d73

    SHA256

    284554ec48ff850588402daa67fb8922664c50d8925b6373919030680b04a77f

    SHA512

    4762f8d4f42d69b41272a5fc4062165c05290b7a2791c4982ce19a343acaf79e1c5b751ae4ed211ccf7e8513ecaaf7ea958191d12ff870bcec1ab8f0bdca9202

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    752750bb4ebc5a983be6c0fed654a91e

    SHA1

    ef93c3fa5e1534ca141a71809c24dc8deb2833ab

    SHA256

    6d66d6d28f5c8cb3f19cc3f534c28ef05bf75db11c3e33392b88e29f32f49e2a

    SHA512

    5fcee5b297dec53f1ee57f5f777ad52589079337efb38f86db0e1588090fa3f91d2be69097b549bda8a1159ce67959d1ff7110107c57de35ed13c4c44fd33bb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b98d19d09609c386acf8211ded91a206

    SHA1

    58a45533c160e231c8e2c93c895a5a8d57026ba1

    SHA256

    b3d46f87c754c73ea8b770a6576615d078200c8d8b442c92ff8fb9666424eb1d

    SHA512

    2aa1a22f0a950d1b65dc6b1ef6b938788862c89dfe26a2f946eaa14339f3b816a213b946f3b31adb1ee6eadac90da5e3cba67078ff22925ad223dab5ea00b5ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f56ef10282e098f238efdb0c7a72498

    SHA1

    4ab2b04d3c45e04f3152949f6931c877147ea53c

    SHA256

    43d1a319956246004e34c769bae474cc08a02ff4982973262fdca9180222b094

    SHA512

    e52250997ed8657627320fb7b4f58268d6c888eca582e333c71a45e2a2139510bba183a2f1ec8281fd5ffb8e6648d6adf516018ebb35f46665e98ba8dc0a54a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9792810cfc4e02bedcfef6de49c089ab

    SHA1

    90211ad1397f03368f20a4e67d5d8b6dd77b1aa5

    SHA256

    254e85a99cb5c478b53fea8b50eba15901501c770120ad8f706ba38d3333658a

    SHA512

    ac7133bd5d969c625855401bdc2d963b1e4c7eed67059db5c86fd3ea43d12beeb86aa35568d0191e13a4d1f7a515029833993f174e2d97fb3bda5cde7d84366b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77d3fe35cf16f108b3ea8e00b4dd3a5c

    SHA1

    0df8afac8834dc129d21e5f36329c574ff226a17

    SHA256

    f22531dff9a4616425515942ee5a1fa8b83a60786fbfeed199d3f5530e7734f6

    SHA512

    665a4901564dfc6d5aaf9f829bde8e1798b562844c1ee06e224fd1172e8a734fa0545556c04d3b739fd028b39663b11f7ad7d9e75759f12e4766567c9f71d573

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    923aab1f63931dc881189479982171c7

    SHA1

    22ac4951fc6ed4b18a7296f3bba3e1666b14db2c

    SHA256

    617a1ae005b2435bbf38a08f7f743109e2fe323d0cc9f4dc83763e75edbdd9e8

    SHA512

    7b91091751fda1476ce9dde3b3c44df2de8e6e0ea2dd771ccf4f4e0e66f19d4da41908610aade01658782b97e914acfea0dd4ac79ff96bf8cfdea1f24c39cbad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1af7d151eac9cc4ce8c263d0f1147c3

    SHA1

    f6398eef7b2edd3b1352597592f8a7e8635793ba

    SHA256

    fb1018cfc5f6d39e26ba8671198d685d3f11f50327b2392d40a3739708922a6c

    SHA512

    93a0e2f75adecea74cb1840a4d905b4c56a71a64675af8a8cd172a629a528ae9c56a7fc4fa07dacb73ded6b159529354dd2c691a6af61434d6ae3e5ea62af7c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fa06bdffaa007b5816fac8fe4d5dbb7

    SHA1

    a7c7af79792809c7e7f5cfaac1055064033a8bed

    SHA256

    d2b7fdc4083bc3f4350c2ac6691f86cc9325225a8e0792911c03d949ee1e5dd9

    SHA512

    77449a15966640a594516c5ceb7b84980efefef44b086518e487e78bea324504120134ca98245cd5057c361008ef3f445085ac1c0d2f3df729048ac44ada8d97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a6d3d1b35116036fa87b9f2a04ff2d0

    SHA1

    0cec9d1e293f64edd61e09ba71ed05b34076f904

    SHA256

    a49c53f4523b4de090ed24ca40f7c469b000c83da44581d6e86c887026d99666

    SHA512

    32e40dfe8cfa75b87aadc9107951922cc0136b743e34f1121bd4ca6f5cbeb595180560f2d863c19d8f10a01463fc4b1200c3a7323700d39a4e055d9d5549be07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2104a8e8d8fdb7343c8869444b770909

    SHA1

    63dfc63c7b99b79398a3ff37737167a1840d4858

    SHA256

    ea87f4571d706ba9ef8d08220944049a3fa7eefae3ab212ff270de6bb936af58

    SHA512

    2ce346bb9bf348287e769537a7c23e6320ae5b5524cc6e3d09ff0c081ccfc6ba3e7b9f1cd7e6a6529c31cd532d93ee33375620b86c9de32633cf511a7cf999a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfd36b3c54f474db0e8166b36dc1edcc

    SHA1

    d3de3ed9e0a277b7d9927716e58d5459199733bb

    SHA256

    0e3da608a2e5c7e95b009859b3c5e60034016a5aae827725c027c0476a64983e

    SHA512

    d6a814eb9275aa1e499f8299fcc31982ca992c4432c120a41223e64467ccb1230b0285c447310d99ecba0a06f5eadc48ee2e3301b0ed5635cb1bffd12003c9ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12b0d64d51e34e163d3cbaa1fa341e35

    SHA1

    2de36d75b58ac42b286668dec7a5f7a6e1f7ff53

    SHA256

    020f080d42f2e927c63d5e3803da3ba99bb12b58fd5f6dbee3e7ca71881241d9

    SHA512

    06e8319a51395423cbc6fa48e3e16acc846c676f2818c3695096bd57eca28634c89a4691158d6aebec61b6b199aad0a1d41fcbb9971c5606904b3aed2182b8a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ed1f1e6b7365b7a5c087473d7b4ef7f

    SHA1

    6ea7014c1072433bf3c167f6393239c691e2acf9

    SHA256

    c53e5d0b154e023a4ae6f6da90bf5987ef76ff0541a5b7340354a0020f14a1b2

    SHA512

    fd7f859c427c6dcfee20ce58f6984dac7aac5f4942a0b03545f5b8825d985da409da6f42ed302fe73dc932361a5564637179c525dff3d359e50a84a3f3b83f64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be68339258da28b434af4305c0b39142

    SHA1

    3431d313746c80a5872b74a482e3650a6432491c

    SHA256

    2586938db762874d7f51d82625dca48545557a8e0916d348dd71ad5d320cf23c

    SHA512

    582bb04fcbc68c47d3ffb72c205a654bd40d4cd0a6392227202692438655cb8d90ffbbaa0088fb6374fbaf44123c4d77fe7ef9b8e417157de0a4b9167fd91915

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4958875690e7ef1d5e43fd6c6ebfa764

    SHA1

    8192acea02292c76c1e9e2634265c6defd8dd143

    SHA256

    d6f168e0b1b6c8488f21f358501d638fe66fff5652647865197a4b9226fbf91c

    SHA512

    bd991ce127b1f2053579a257add7194f9fcdb01d290f362958f29e698d3c45f07d680d436d8839b6ad8f8e0e823df4603bbba006e7f79b87b8ffc65053c29aba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a74c19c28d2dbde60cf5aae0f03397f9

    SHA1

    a55593d1fa03a46df55fac25d4d6505c388a66c7

    SHA256

    93be7afc0b1b3e988b7800af1daabe9cd074b3b0aefb1596f27dc34723077ac8

    SHA512

    eca810859f232e19551ab95d0c98395ffd9e64d746825235fd473310641a6ee0404327263628e4a1e7f01284596689a44a066cf37aadac943ebb92ced9e35d81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e54467675ac095310eafa6af1d294fc4

    SHA1

    236a5bf9920172bc2a2abd536b9135f3cf89c645

    SHA256

    a54705fa3d13f4c48eaeabda99399cc7645e148d013bb96a1ac63f3a5b43d70d

    SHA512

    b54ddc743a1080cd7aef328831613eb9715bd42333fd53ed57fe776a328ae93d6a63b72b20596db97509d0a962a341642d189754e8d63992834ae70f1c58c851

  • C:\Users\Admin\AppData\Local\Temp\CabDC3C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDCFD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1856-5-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2384-12-0x0000000000060000-0x00000000000CD000-memory.dmp

    Filesize

    436KB

  • memory/2940-6-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2940-446-0x0000000000400000-0x00000000004B9200-memory.dmp

    Filesize

    740KB

  • memory/2940-7-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2940-8-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2940-10-0x0000000000400000-0x00000000004B9200-memory.dmp

    Filesize

    740KB

  • memory/2940-9-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2940-17-0x0000000000400000-0x00000000004B9200-memory.dmp

    Filesize

    740KB

  • memory/2940-16-0x0000000000400000-0x00000000004B9200-memory.dmp

    Filesize

    740KB

  • memory/2940-4-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2940-2-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2940-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2940-15-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB