Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/12/2024, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe
-
Size
724KB
-
MD5
b6ac631bfeda3b4a32058b4b7763ead0
-
SHA1
8743eaf53f9851494b8b347044c88a3b1618c7b4
-
SHA256
545144737c64e9ba29f799a58c81a79131361e5754c423fca7c0394f46f2939d
-
SHA512
820e763043347b0b3c2e11ee984ae1f11fa29335df807d7d608f9a457403a034173e08314d026bd71e971e3b5f9571acbc1b0a30f9e3739ab07f7151bbff6ef6
-
SSDEEP
12288:9c//////XhHkFJ2PSwVIghpSZHzudJgdmthwKAYb5jYE541xIAZDnzyh6:9c//////XhEFCfzSNz2ujcWE541xIAFF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/2336-7-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2336-6-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2336-8-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2336-4-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2336-9-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2336-11-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2336-15-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2120 set thread context of 2336 2120 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 30 PID 2336 set thread context of 3048 2336 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57EFA471-B061-11EF-B0B8-7A9F8CACAEA3} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439273629" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 1112 IEXPLORE.EXE 1112 IEXPLORE.EXE 1112 IEXPLORE.EXE 1112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2336 2120 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2336 2120 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2336 2120 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2336 2120 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2336 2120 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2336 2120 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 30 PID 2336 wrote to memory of 3048 2336 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3048 2336 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3048 2336 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3048 2336 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 31 PID 2336 wrote to memory of 3048 2336 b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe 31 PID 3048 wrote to memory of 1112 3048 IEXPLORE.EXE 32 PID 3048 wrote to memory of 1112 3048 IEXPLORE.EXE 32 PID 3048 wrote to memory of 1112 3048 IEXPLORE.EXE 32 PID 3048 wrote to memory of 1112 3048 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b6ac631bfeda3b4a32058b4b7763ead0_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1112
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589780d24251854dfbe7ce930b3d96fb9
SHA17a2682630ca8eb25b1503d3834aba40247923cb2
SHA256dbf41b5fb54165c2a93422987d605ab84eae3f8d9f6d2723b79fd83409812def
SHA5126b28f76fecb569a4383900f1ef2647e2662d72b2921b29f773e5d4c026b803505281a1d6302f76a121d18e4905cf48805d2ceef392c24b1703c78023e88ad65a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c056181fc758626c4ecff46f81e54c0
SHA1bb53b7f04a14f92e9f9bdaaeb3f33e7e873124e3
SHA256d12236b142e8e134bf1cc8a35bdbd652a9d9639ea64601705137e5845366052c
SHA5122873160a3caf3dd72f7c63013e3ef3ab7fe6bb6e0b7301c695685b4bdc7400e8fe86779caf9ef29504734d9e2c1c99d24f26e5427b19ddbe8a3e56c7dd7515d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061f4b91cb20d1fdb4d126469d344802
SHA10dab3631f3eeb033a704f9fd9326f758cf5fa9f7
SHA256594bc9cf33d69732940561a6c3ee87fa0e60abe40f4ffc3a99482dd29bee7d62
SHA5128b70b90d11bd4e4ddd2bbe7a6c07968f65a823145971ec685aa8f2198366ef64333e3725f99c0b82e782eb720375468bb8409c8953da47ce81fbe89aaa828f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003606657f465421efdd41d08c6f8700
SHA11346fc13d95ee16ef4b6ff8d9b14c3fe0f25d443
SHA256cef3e431f662cf31cb6e53ba9ffae04ba98f7b2bbd9c0cd4ace2a2e72ac6c8c5
SHA512f8878f24a158c9613248ee944e29b0b2678505a480fcf8430cbc6f0cc61082d035297138a79cef42549c2123d377e300a8e611a0617fd951d5f3abfe54bad700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b9ae82cd2cbf80cbd0da7c26054c35
SHA10c905c49c5ac19ca87e9b68d744f7be0f757dc2c
SHA25660d9dac5de2a0eed057e4a1ef3ead3eaddfc9f89be571d6f84b7c2dd0d6aaff4
SHA512b019539004ffd5d53cb8a59c79fe5159f3047e1a22e75ae949a632f36c366ae475ba11aad1716c080b8e809fd5673953883976df11cf194c55cf8cc36a49e100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bc35c94bafd13f45cc9a01d20812618
SHA164a1d53c36a684b9bbf9856fc62e7fd7065e2de8
SHA2569d9e1293c10f7aaf1e3963562bc28c8cc2f97680b54c8dabf07b3c92bb97dce3
SHA5128d6b75b4ad4789445dadb5ae726bb563c6ff780b1f7dc272dfebce59a6cb5a844617bb2f95379b24e1d547ab1aefcf7b4a58903f5c27f2319d308c7cafa3cb58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51c71db9e1c829c2ef53ecd0e7f35a9
SHA1560c220d963eb2c75cbf8dcb186fb0b891d36c67
SHA256ced7ffe73a488acdfd2e143cae08d363085788a361c45b932a635e030cae8e36
SHA512e56a5a3a3457d9f727bf9c4812d3b5be0b2a4a4c9eb36cd90ef2c6472cd0c80b3eb27c115ce5c63e8faa5a0c00e2bf9e48ca34b66676390b02e6bf215caaf0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af644d6df46e7a70ce2e7577e0fe023
SHA1ad3e4bf814267452d85b02c898095cfb45cf2c4c
SHA256cf66b719f96bef28415060c9b3f83467393e3829f1dd57f7af136f3c611c2b0b
SHA51268b4f1f13710d026ec1aaa0e967cab4994d99fac67af02dc58e462ce8e6c54ee028b2eb62a635b600af5962e1eb978f58008ae738fca67306d852db21fdd183e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510030a4d5de295c77acebf9f88684b6f
SHA1192c35c26284e419a4593f7aaf0250f00e4a68c8
SHA256cc66bde71aad308eb9e0a12f66af6c2f26d51962562a5aef370280e94fad0f75
SHA512e432ce71bede58c650df6cb941bd7cc066006fb6c99391f0e3f9a79a555c85b7e425c114f91b7a56dc5277208bcb97a39c7973a397240980788c6eb9ae9c92dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a821e7d878ee0f33cf060e1967970ac9
SHA19c6ab9d391c91c735e72c4e03fa999f589c34905
SHA256c6f167788bcd336f6fbb8271488dcf5c0bf0b446e6b2fb45def0404fe7975fd6
SHA5128598c4beb6694db92bc5584704842699ef86f9c63bd339aafdcf1d846b36e09ff225ef0db906ba563f9519e485753235ffb88427b07e1cfc1373cb6a1f0d92ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580981a38e00307548fa215daca990fab
SHA1bf5e81f107d776a333c58791c7980dda567422d9
SHA256290b3c633ae05adf13285b4e4c6732211717916724dce32a80ea7c19f3e7d9b8
SHA512a4d75a2f97608901d96ca486ff2f74176cffbe6eac8aeb980f90e3def76be0ffa5e2aebe0fb6438b3a294b93496183077b007438e1eb0713f12e4fa4a14920ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d8706664d0ed078ed41fe6536f9c5d
SHA1ab5c551a80591a8430d9428214e6886ab88f0396
SHA25628864028a4b5a0d7fce4fee1396215b97f3d9130c08ba888fc48df3892aa0f7a
SHA5124c4c395cb5679b2b0c91b47dad10c0e850e965c4c1da078f265991df571db414f9a15520618ed2b32bddcf5c5b05497bda814e49011762eb1c434d0a10860e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5374f56e3f8aaa4e23e8907e6aad71362
SHA14b081617ba6c320a1e0d504c2845565e597e61c6
SHA256936b557550fb3a1d520cd7e735dcef8c6751fbe8edd5d7623c1f4080ad4f48b8
SHA5120b695b93d5f032b2291022ccf3311d937d1caeb1a55cd017a89b7ec3a15a9588a85afe724bba880d36b81481ac539829cef64e1aaa0a2c435b7b52e87f4feb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e6286d402d8db7c8ca6288a1f67430
SHA10172b3f023b942672a7f49a873dfc9c740a882c0
SHA2567fe4f289fa9db9cb31ae94f3d3b721f724a7d48e06138d7def6be288be91d8b4
SHA51237eeda8703afa6626de4846d0bd29ad07460eab694e4e8170cb7da0beba89f5e66e583b2eb353558a709761d6dded7222edf5cd90c3d61aa71b8134b5feab026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561acdee733603e7721870a450f1294b1
SHA173599e45946ee03475ff05cec13649c081fc16e2
SHA256be9d85fd4d9ee6ab4bfec5de167eb5d9f83b8a8c2a05ae40754d6d3ef8018fed
SHA5120cd49d0bdb4a78db686cb99ae5185235cbcc16ed25859c4defb71cdd4b93ade401d70dbf08e6aaa2e80902dd4edfb6d9e7ba0becc2d1b2d5dcc715243b0992a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3eb83e6c7d7ab319dac47daafc87f2d
SHA1944d984013a467b9162e552ed1ca678c619cedf9
SHA256d9f63b585704b557a83ed781696bb8d6a002d574d99f50271b6112a911a9b217
SHA51278c11834eb4f76d1596dae65d58cd95ca2651f660f728e11831a7cb1c24a2cc450a92e342967545bd61ddc5fc51ea2cc6bb8d57a2d821c2610aea66e61620cfc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b