Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe
-
Size
278KB
-
MD5
bba2d5c03f40ba32bdc856f518476191
-
SHA1
f0745259c5c1b6f1f861fd30a52e0ca051cc2618
-
SHA256
e4da3941495b5d0f60319022592645e531bb7b881f2f13947d405be2a4eb88fc
-
SHA512
481270216e9a7d0d383fe9559e29bbabc12b961ea2acc91a06a77203810dbfdc860c463345637ea73304764fc5f2f2515ef72c42f6b832f265e6a599f54acdd5
-
SSDEEP
6144:4AlIwcAeOGAmSdXWnPTdnDOGIKQ8cXR3aGSziW2/g34hPOUd9E:4AIVLAmSdWnrdDWK+XRHWZ341OUM
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2440-2-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 behavioral1/memory/2440-6-0x0000000000400000-0x0000000000506000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2440 set thread context of 2568 2440 bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB701691-B12B-11EF-BC71-EAF933E40231} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439360553" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE 2264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2568 2440 bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe 28 PID 2440 wrote to memory of 2568 2440 bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe 28 PID 2440 wrote to memory of 2568 2440 bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe 28 PID 2440 wrote to memory of 2568 2440 bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe 28 PID 2440 wrote to memory of 2568 2440 bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe 28 PID 2568 wrote to memory of 2264 2568 IEXPLORE.EXE 29 PID 2568 wrote to memory of 2264 2568 IEXPLORE.EXE 29 PID 2568 wrote to memory of 2264 2568 IEXPLORE.EXE 29 PID 2568 wrote to memory of 2264 2568 IEXPLORE.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c762ce9b3d57c34a62ff6b16bc1e7ef4
SHA1380aa7e87e53fdf0c5d847eb02eca66cdbb42982
SHA2561fecac42e68d9a8a477fa0f4c81276ddbb93ac78513caa9bead4da36df1df18a
SHA512745aa12070a6b1f64b4c4eb0094c58dc63c6510bc6fa7de821f5367c69da842ef805fbec9e8fdec4f6bdb55b8f3d905bd7db69defd2d481c64a947d6e70f7294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8b64e2624a20ec3862a217630109e5
SHA1e223f6393e2aa9396b0cf188f88919f12f552184
SHA2562f93bd501f9e8b9125deea02c83cb08761963d04d311d33c0ae61188252331a7
SHA512cb8179fdaedb12655f48283d92c58c0f266f60b78342ffc7a5b2f42e1c87338cf2879e64e588f5bd9fc98aa19bc7abc0125b083f0ec0ca02c89e18fe63113bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e2251fe16f447409e6b8860f4f7862
SHA1cf75bba49772337ba169158f4de6decf13325d3a
SHA2568c374b7215de85ed81a7ae8d8f4b794a7be71ecbbf7cbbf10677e1ef729fcfb8
SHA512d1792bb08e5aba005e482c27306636b23a404748e7c32b1f16fe1e50ff9ec8f338803a2a3880b8098fc9cbcba90f956e5525888e9981e38532101699cd48efcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a12bbf82ce5db9fa6ee24065541a4c
SHA1ee2ce4f481960b421bda7fde6fa51773a97fe398
SHA256e98a7b7fb1d44d9d9c2822c3ede64cb00e4e4ced3c690945b0e0c627c1fe1706
SHA512b7fab1f691ea3c66059c7813caf240a3722937d1caa90b2700f8bd00af00147e493fac6038fcb34287bd385658fbf59d5727bebca9d9b5daa3ba9899d5a813e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a431be15db0f53c2b5076c78e9082e7
SHA1f29c08d8b1efa151e21c2b56712e1e95877ddc12
SHA2566a3b77d059feb27b43e4ff2d9fe891c934b8ad18033e6fd77a59ca2ba7bab2a2
SHA512f0c576b366466b8f864c9e061cacf85609f3d2df1218990b842daefb18a83e8b3dd34f36ad502206b0a6dbe7b0f64783a618349dc961edb3ee3746148eb27c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc1e5ed58b390c5cdaaa6f6d007d626
SHA1c6a721a25cb9b1c3575b83f58e0102dbddbde818
SHA2568143b6e20dfba89bbaa51356b4e6a72cedafc176bf2ef5bb8d00bf4bb80f677d
SHA51217ce5d5493557d4290c5977e95a7ac57153633a60e37a0fab4d577d2908afd64ec746443c470b7c6907c17d8e45062c78a853dc58591e5a69307df1c7593f307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4606541ec9ae7fedd3339544483d900
SHA1732629db2b36215d1dfecf71a7eea49b45285152
SHA256fc4bcacba4b2dad382f101ab2b0a87d557889f9c4c98d54be3c03fa643f3e036
SHA51230b88a25f57a3fdf0c57331e275b808925525f7a394a45be970ffaac7850bef51d2fa1c13511151fb8093d6cdd2012a6f9cc5e2c1b58a923e491a8a9f5def5b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5312f2c40644ee4fda61da3fbe31e4265
SHA15e606f28ab57eadafa6abc23f364429430382e6d
SHA256c05b315a23fcabb4c624f019511926354126d40a2ea51003151550c51f4dcfd3
SHA5124fc79fab204954324eb1da6754464e92ea4ca1b8a2971e55b5059bc1db29fa4b1cfa31490a0b0bf8fda2f1f163267b5c64c3697f04de275badb9f125f1357380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9091401c45d6adb1a3423740a1598a0
SHA177e1d51cb162a76237838020c6c6cad501e1e4eb
SHA2566544814088dbdd3ab9f0beb9c6b2cb2e5440d0e603a548a6405b3c949dd2d71f
SHA512a0282c964eeff7b61fc2fe4140272fd47ee7e58ab15d5cdda3fbe7396287e0dc5996899ec1b9e6e0beae7a8acbf814a8ea09f090326182b7f492ed8dde148f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fef4458aa8a403006f441e6a9ef7b9f
SHA1bb3c1472282c6cc4be996fb62a2ae49b976afe68
SHA256b8500627b8071a155a1d3bd5c819089395b8c2eb9fbf63a00b126507a77e1061
SHA512d984cf1d41ad6ca2d5187c091d4f2d75ae1fa170ee60fda4ba22ac065c98a18e5d3111aa42317d3c11174faeb242f051242bb4553e966a9704ca08f3fc74db2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03dd98e5decda5c72d9c67e5abf671a
SHA163473fc6b956a296fd84f30e27bb7595579b2eb2
SHA2561137797ef66d075f317f23a291e3a82877732464064ede286538df7de22a71ce
SHA512bf22fe31b7c3dad94e6e78490a444e86e842d44fbf8ff032bfece40b6d13f955fd26cf55029900c7cb38d29eaba960d88f9b4e7f38a74a4cb0f7b25031339a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812989ea931000494cc0c2d95b4b7c52
SHA15dd7e909fa1caefe81f0b44293d4290201dcc6fb
SHA256897426dbb6ef8982b2cbff90468a466fde2c1eff06b5195a45dba3e261d417ec
SHA51249624d8813091e2fcbc5d83dc5929f8798dbff3489f41e61702a5c80c395eff1e3bc64bdc6171601d57f8aad9a997dcfd0cee44e12b05993b2be9f739b20dd4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51217a5ab79ec72b691cd0dce8b5ad411
SHA1599b91ab08b8846a3bef18a02b237a1f4644e049
SHA25615404cf9a0634d0ce900544d6cf4153cc2b21f062386e8b1ceb243f19179ec7e
SHA512a24544eb4fcdfe4e0ad96787fb0033ec4a56d38d72bf750a33d4d76a85cc43c0352765fff379475497357ba1a979a77e1ca7c472c11809e7dc16ac0dfef57e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ea25d8b393ded01f32d79383c3e07e
SHA179773dfbd7ce0d5c6bdb0e92951f8b30f886ad97
SHA256f0d782f68b787cc34d72679013e33c5ebe90592b4b833bf93fdc83b6438008d7
SHA512586ced5a86c24a45ad36876ec3fd0ee323383cb83bac8b9a3acbafe0eae4af24fd09f66f567201ae46253d2e645cec62235812cdcf196fe1ee8c90ffa77b7302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503875ba79d5558cc2fc48d9e0c537262
SHA1d8d0cf6d1a92474c203af0e183d3a0822172781e
SHA256ea1339ced8837dd590b0dab3bfcb9b75c97123f9f9b708d03fe554177764e04e
SHA512e95f4c4c6cf8c5f111df9f19e2b219d4d334f1a4510ddf6a1295c5ef9675c708c5fe15df45d376dcb2fbb84bcfd6af943cf3a0fe46082d7c82c6755edc6a03ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f401fdd438a5bc65228b31024c9ba239
SHA1d7d6c7d7449f4978476951f721ecce3fd806a532
SHA25645a2dd1626b72c8864be93dfa723055e243d64dd7afedfec791ea885f41ab625
SHA512b0c3fcdb4e06d0afda8ba05788e8498720d511965408fa5723170766029d5094c536298f72a98902d5c4382612cfea00ac08e83f0b63dd42691c9a6002e79844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422e70f627457d2bc55225470c4ad00c
SHA1ff00d533c1c1f7b580d5e33a625a2bd781348b9a
SHA256f505b176d52d3f052a9ce0931ef2bf1d0484fb6b90d62a3476ebe64ca9d1688e
SHA512d605055a1ae36abf4decf2efde7f740443fce7af74499fea06d9e60ca3b6df10965b7fbe1f895447df09339820fa0ff1d7301d32e103093400e148b134cc08d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b699f26304a7c4f08feb7bc7ffc86050
SHA11ee5bb98c18b7aae886d7432844b55be9497fd10
SHA25637cd268e4f5f8ae9bb5615bac8920b1f068f8d387a3cd9b1acaea945b10aebcc
SHA5127af297dff72ff04d3389027c4e72e10e8187384161fc1717d4c3f03fac85f8cae569c16279a0e7a8ec5e42125442cc7e820fa9842c01bd4ef5bcddd16debf4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0925bfe9d52109bb1047d4c6a754c7
SHA1b0473952226221c905eaf72e8fd5bb9b11c8cfd0
SHA256d995a6f70e34e8b727b6c227b3b96bf73a09111c6d742e3674d4819df183adcb
SHA51277b30dc9e5748904068d9d86226245ce690ff5056e0506957bf798ee690dfbd16e4f601933de1d297af55fa4300e415f19f95f9e125ba4c953daaefba9cc9249
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b