Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2024, 03:55

General

  • Target

    b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe

  • Size

    724KB

  • MD5

    b6ac631bfeda3b4a32058b4b7763ead0

  • SHA1

    8743eaf53f9851494b8b347044c88a3b1618c7b4

  • SHA256

    545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939d

  • SHA512

    820e763043347b0b3c2e11ee984ae1f11fa29335df807d7d608f9a457403a034173e08314d026bd71e971e3b5f9571acbc1b0a30f9e3739ab07f7151bbff6ef6

  • SSDEEP

    12288:9c//////XhHkFJ2PSwVIghpSZHzudJgdmthwKAYb5jYE541xIAZDnzyh6:9c//////XhEFCfzSNz2ujcWE541xIAFF

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89780d24251854dfbe7ce930b3d96fb9

    SHA1

    7a2682630ca8eb25b1503d3834aba40247923cb2

    SHA256

    dbf41b5fb54165c2a93422987d605ab84eae3f8d9f6d2723b79fd83409812def

    SHA512

    6b28f76fecb569a4383900f1ef2647e2662d72b2921b29f773e5d4c026b803505281a1d6302f76a121d18e4905cf48805d2ceef392c24b1703c78023e88ad65a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c056181fc758626c4ecff46f81e54c0

    SHA1

    bb53b7f04a14f92e9f9bdaaeb3f33e7e873124e3

    SHA256

    d12236b142e8e134bf1cc8a35bdbd652a9d9639ea64601705137e5845366052c

    SHA512

    2873160a3caf3dd72f7c63013e3ef3ab7fe6bb6e0b7301c695685b4bdc7400e8fe86779caf9ef29504734d9e2c1c99d24f26e5427b19ddbe8a3e56c7dd7515d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    061f4b91cb20d1fdb4d126469d344802

    SHA1

    0dab3631f3eeb033a704f9fd9326f758cf5fa9f7

    SHA256

    594bc9cf33d69732940561a6c3ee87fa0e60abe40f4ffc3a99482dd29bee7d62

    SHA512

    8b70b90d11bd4e4ddd2bbe7a6c07968f65a823145971ec685aa8f2198366ef64333e3725f99c0b82e782eb720375468bb8409c8953da47ce81fbe89aaa828f70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    003606657f465421efdd41d08c6f8700

    SHA1

    1346fc13d95ee16ef4b6ff8d9b14c3fe0f25d443

    SHA256

    cef3e431f662cf31cb6e53ba9ffae04ba98f7b2bbd9c0cd4ace2a2e72ac6c8c5

    SHA512

    f8878f24a158c9613248ee944e29b0b2678505a480fcf8430cbc6f0cc61082d035297138a79cef42549c2123d377e300a8e611a0617fd951d5f3abfe54bad700

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05b9ae82cd2cbf80cbd0da7c26054c35

    SHA1

    0c905c49c5ac19ca87e9b68d744f7be0f757dc2c

    SHA256

    60d9dac5de2a0eed057e4a1ef3ead3eaddfc9f89be571d6f84b7c2dd0d6aaff4

    SHA512

    b019539004ffd5d53cb8a59c79fe5159f3047e1a22e75ae949a632f36c366ae475ba11aad1716c080b8e809fd5673953883976df11cf194c55cf8cc36a49e100

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bc35c94bafd13f45cc9a01d20812618

    SHA1

    64a1d53c36a684b9bbf9856fc62e7fd7065e2de8

    SHA256

    9d9e1293c10f7aaf1e3963562bc28c8cc2f97680b54c8dabf07b3c92bb97dce3

    SHA512

    8d6b75b4ad4789445dadb5ae726bb563c6ff780b1f7dc272dfebce59a6cb5a844617bb2f95379b24e1d547ab1aefcf7b4a58903f5c27f2319d308c7cafa3cb58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b51c71db9e1c829c2ef53ecd0e7f35a9

    SHA1

    560c220d963eb2c75cbf8dcb186fb0b891d36c67

    SHA256

    ced7ffe73a488acdfd2e143cae08d363085788a361c45b932a635e030cae8e36

    SHA512

    e56a5a3a3457d9f727bf9c4812d3b5be0b2a4a4c9eb36cd90ef2c6472cd0c80b3eb27c115ce5c63e8faa5a0c00e2bf9e48ca34b66676390b02e6bf215caaf0c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5af644d6df46e7a70ce2e7577e0fe023

    SHA1

    ad3e4bf814267452d85b02c898095cfb45cf2c4c

    SHA256

    cf66b719f96bef28415060c9b3f83467393e3829f1dd57f7af136f3c611c2b0b

    SHA512

    68b4f1f13710d026ec1aaa0e967cab4994d99fac67af02dc58e462ce8e6c54ee028b2eb62a635b600af5962e1eb978f58008ae738fca67306d852db21fdd183e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10030a4d5de295c77acebf9f88684b6f

    SHA1

    192c35c26284e419a4593f7aaf0250f00e4a68c8

    SHA256

    cc66bde71aad308eb9e0a12f66af6c2f26d51962562a5aef370280e94fad0f75

    SHA512

    e432ce71bede58c650df6cb941bd7cc066006fb6c99391f0e3f9a79a555c85b7e425c114f91b7a56dc5277208bcb97a39c7973a397240980788c6eb9ae9c92dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a821e7d878ee0f33cf060e1967970ac9

    SHA1

    9c6ab9d391c91c735e72c4e03fa999f589c34905

    SHA256

    c6f167788bcd336f6fbb8271488dcf5c0bf0b446e6b2fb45def0404fe7975fd6

    SHA512

    8598c4beb6694db92bc5584704842699ef86f9c63bd339aafdcf1d846b36e09ff225ef0db906ba563f9519e485753235ffb88427b07e1cfc1373cb6a1f0d92ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    80981a38e00307548fa215daca990fab

    SHA1

    bf5e81f107d776a333c58791c7980dda567422d9

    SHA256

    290b3c633ae05adf13285b4e4c6732211717916724dce32a80ea7c19f3e7d9b8

    SHA512

    a4d75a2f97608901d96ca486ff2f74176cffbe6eac8aeb980f90e3def76be0ffa5e2aebe0fb6438b3a294b93496183077b007438e1eb0713f12e4fa4a14920ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94d8706664d0ed078ed41fe6536f9c5d

    SHA1

    ab5c551a80591a8430d9428214e6886ab88f0396

    SHA256

    28864028a4b5a0d7fce4fee1396215b97f3d9130c08ba888fc48df3892aa0f7a

    SHA512

    4c4c395cb5679b2b0c91b47dad10c0e850e965c4c1da078f265991df571db414f9a15520618ed2b32bddcf5c5b05497bda814e49011762eb1c434d0a10860e9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    374f56e3f8aaa4e23e8907e6aad71362

    SHA1

    4b081617ba6c320a1e0d504c2845565e597e61c6

    SHA256

    936b557550fb3a1d520cd7e735dcef8c6751fbe8edd5d7623c1f4080ad4f48b8

    SHA512

    0b695b93d5f032b2291022ccf3311d937d1caeb1a55cd017a89b7ec3a15a9588a85afe724bba880d36b81481ac539829cef64e1aaa0a2c435b7b52e87f4feb78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73e6286d402d8db7c8ca6288a1f67430

    SHA1

    0172b3f023b942672a7f49a873dfc9c740a882c0

    SHA256

    7fe4f289fa9db9cb31ae94f3d3b721f724a7d48e06138d7def6be288be91d8b4

    SHA512

    37eeda8703afa6626de4846d0bd29ad07460eab694e4e8170cb7da0beba89f5e66e583b2eb353558a709761d6dded7222edf5cd90c3d61aa71b8134b5feab026

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61acdee733603e7721870a450f1294b1

    SHA1

    73599e45946ee03475ff05cec13649c081fc16e2

    SHA256

    be9d85fd4d9ee6ab4bfec5de167eb5d9f83b8a8c2a05ae40754d6d3ef8018fed

    SHA512

    0cd49d0bdb4a78db686cb99ae5185235cbcc16ed25859c4defb71cdd4b93ade401d70dbf08e6aaa2e80902dd4edfb6d9e7ba0becc2d1b2d5dcc715243b0992a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3eb83e6c7d7ab319dac47daafc87f2d

    SHA1

    944d984013a467b9162e552ed1ca678c619cedf9

    SHA256

    d9f63b585704b557a83ed781696bb8d6a002d574d99f50271b6112a911a9b217

    SHA512

    78c11834eb4f76d1596dae65d58cd95ca2651f660f728e11831a7cb1c24a2cc450a92e342967545bd61ddc5fc51ea2cc6bb8d57a2d821c2610aea66e61620cfc

  • C:\Users\Admin\AppData\Local\Temp\CabC2B6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC365.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2120-5-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2336-9-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2336-11-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2336-15-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2336-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2336-2-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2336-4-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2336-8-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2336-6-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2336-7-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/3048-12-0x00000000001B0000-0x000000000026C000-memory.dmp

    Filesize

    752KB