Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 04:04

General

  • Target

    bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe

  • Size

    278KB

  • MD5

    bba2d5c03f40ba32bdc856f518476191

  • SHA1

    f0745259c5c1b6f1f861fd30a52e0ca051cc2618

  • SHA256

    e4da3941495b5d0f60319022592645e531bb7b881f2f13947d405be2a4eb88fc

  • SHA512

    481270216e9a7d0d383fe9559e29bbabc12b961ea2acc91a06a77203810dbfdc860c463345637ea73304764fc5f2f2515ef72c42f6b832f265e6a599f54acdd5

  • SSDEEP

    6144:4AlIwcAeOGAmSdXWnPTdnDOGIKQ8cXR3aGSziW2/g34hPOUd9E:4AIVLAmSdWnrdDWK+XRHWZ341OUM

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bba2d5c03f40ba32bdc856f518476191_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c762ce9b3d57c34a62ff6b16bc1e7ef4

    SHA1

    380aa7e87e53fdf0c5d847eb02eca66cdbb42982

    SHA256

    1fecac42e68d9a8a477fa0f4c81276ddbb93ac78513caa9bead4da36df1df18a

    SHA512

    745aa12070a6b1f64b4c4eb0094c58dc63c6510bc6fa7de821f5367c69da842ef805fbec9e8fdec4f6bdb55b8f3d905bd7db69defd2d481c64a947d6e70f7294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b8b64e2624a20ec3862a217630109e5

    SHA1

    e223f6393e2aa9396b0cf188f88919f12f552184

    SHA256

    2f93bd501f9e8b9125deea02c83cb08761963d04d311d33c0ae61188252331a7

    SHA512

    cb8179fdaedb12655f48283d92c58c0f266f60b78342ffc7a5b2f42e1c87338cf2879e64e588f5bd9fc98aa19bc7abc0125b083f0ec0ca02c89e18fe63113bd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83e2251fe16f447409e6b8860f4f7862

    SHA1

    cf75bba49772337ba169158f4de6decf13325d3a

    SHA256

    8c374b7215de85ed81a7ae8d8f4b794a7be71ecbbf7cbbf10677e1ef729fcfb8

    SHA512

    d1792bb08e5aba005e482c27306636b23a404748e7c32b1f16fe1e50ff9ec8f338803a2a3880b8098fc9cbcba90f956e5525888e9981e38532101699cd48efcf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63a12bbf82ce5db9fa6ee24065541a4c

    SHA1

    ee2ce4f481960b421bda7fde6fa51773a97fe398

    SHA256

    e98a7b7fb1d44d9d9c2822c3ede64cb00e4e4ced3c690945b0e0c627c1fe1706

    SHA512

    b7fab1f691ea3c66059c7813caf240a3722937d1caa90b2700f8bd00af00147e493fac6038fcb34287bd385658fbf59d5727bebca9d9b5daa3ba9899d5a813e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a431be15db0f53c2b5076c78e9082e7

    SHA1

    f29c08d8b1efa151e21c2b56712e1e95877ddc12

    SHA256

    6a3b77d059feb27b43e4ff2d9fe891c934b8ad18033e6fd77a59ca2ba7bab2a2

    SHA512

    f0c576b366466b8f864c9e061cacf85609f3d2df1218990b842daefb18a83e8b3dd34f36ad502206b0a6dbe7b0f64783a618349dc961edb3ee3746148eb27c0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfc1e5ed58b390c5cdaaa6f6d007d626

    SHA1

    c6a721a25cb9b1c3575b83f58e0102dbddbde818

    SHA256

    8143b6e20dfba89bbaa51356b4e6a72cedafc176bf2ef5bb8d00bf4bb80f677d

    SHA512

    17ce5d5493557d4290c5977e95a7ac57153633a60e37a0fab4d577d2908afd64ec746443c470b7c6907c17d8e45062c78a853dc58591e5a69307df1c7593f307

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4606541ec9ae7fedd3339544483d900

    SHA1

    732629db2b36215d1dfecf71a7eea49b45285152

    SHA256

    fc4bcacba4b2dad382f101ab2b0a87d557889f9c4c98d54be3c03fa643f3e036

    SHA512

    30b88a25f57a3fdf0c57331e275b808925525f7a394a45be970ffaac7850bef51d2fa1c13511151fb8093d6cdd2012a6f9cc5e2c1b58a923e491a8a9f5def5b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    312f2c40644ee4fda61da3fbe31e4265

    SHA1

    5e606f28ab57eadafa6abc23f364429430382e6d

    SHA256

    c05b315a23fcabb4c624f019511926354126d40a2ea51003151550c51f4dcfd3

    SHA512

    4fc79fab204954324eb1da6754464e92ea4ca1b8a2971e55b5059bc1db29fa4b1cfa31490a0b0bf8fda2f1f163267b5c64c3697f04de275badb9f125f1357380

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9091401c45d6adb1a3423740a1598a0

    SHA1

    77e1d51cb162a76237838020c6c6cad501e1e4eb

    SHA256

    6544814088dbdd3ab9f0beb9c6b2cb2e5440d0e603a548a6405b3c949dd2d71f

    SHA512

    a0282c964eeff7b61fc2fe4140272fd47ee7e58ab15d5cdda3fbe7396287e0dc5996899ec1b9e6e0beae7a8acbf814a8ea09f090326182b7f492ed8dde148f42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fef4458aa8a403006f441e6a9ef7b9f

    SHA1

    bb3c1472282c6cc4be996fb62a2ae49b976afe68

    SHA256

    b8500627b8071a155a1d3bd5c819089395b8c2eb9fbf63a00b126507a77e1061

    SHA512

    d984cf1d41ad6ca2d5187c091d4f2d75ae1fa170ee60fda4ba22ac065c98a18e5d3111aa42317d3c11174faeb242f051242bb4553e966a9704ca08f3fc74db2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d03dd98e5decda5c72d9c67e5abf671a

    SHA1

    63473fc6b956a296fd84f30e27bb7595579b2eb2

    SHA256

    1137797ef66d075f317f23a291e3a82877732464064ede286538df7de22a71ce

    SHA512

    bf22fe31b7c3dad94e6e78490a444e86e842d44fbf8ff032bfece40b6d13f955fd26cf55029900c7cb38d29eaba960d88f9b4e7f38a74a4cb0f7b25031339a87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    812989ea931000494cc0c2d95b4b7c52

    SHA1

    5dd7e909fa1caefe81f0b44293d4290201dcc6fb

    SHA256

    897426dbb6ef8982b2cbff90468a466fde2c1eff06b5195a45dba3e261d417ec

    SHA512

    49624d8813091e2fcbc5d83dc5929f8798dbff3489f41e61702a5c80c395eff1e3bc64bdc6171601d57f8aad9a997dcfd0cee44e12b05993b2be9f739b20dd4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1217a5ab79ec72b691cd0dce8b5ad411

    SHA1

    599b91ab08b8846a3bef18a02b237a1f4644e049

    SHA256

    15404cf9a0634d0ce900544d6cf4153cc2b21f062386e8b1ceb243f19179ec7e

    SHA512

    a24544eb4fcdfe4e0ad96787fb0033ec4a56d38d72bf750a33d4d76a85cc43c0352765fff379475497357ba1a979a77e1ca7c472c11809e7dc16ac0dfef57e48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8ea25d8b393ded01f32d79383c3e07e

    SHA1

    79773dfbd7ce0d5c6bdb0e92951f8b30f886ad97

    SHA256

    f0d782f68b787cc34d72679013e33c5ebe90592b4b833bf93fdc83b6438008d7

    SHA512

    586ced5a86c24a45ad36876ec3fd0ee323383cb83bac8b9a3acbafe0eae4af24fd09f66f567201ae46253d2e645cec62235812cdcf196fe1ee8c90ffa77b7302

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03875ba79d5558cc2fc48d9e0c537262

    SHA1

    d8d0cf6d1a92474c203af0e183d3a0822172781e

    SHA256

    ea1339ced8837dd590b0dab3bfcb9b75c97123f9f9b708d03fe554177764e04e

    SHA512

    e95f4c4c6cf8c5f111df9f19e2b219d4d334f1a4510ddf6a1295c5ef9675c708c5fe15df45d376dcb2fbb84bcfd6af943cf3a0fe46082d7c82c6755edc6a03ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f401fdd438a5bc65228b31024c9ba239

    SHA1

    d7d6c7d7449f4978476951f721ecce3fd806a532

    SHA256

    45a2dd1626b72c8864be93dfa723055e243d64dd7afedfec791ea885f41ab625

    SHA512

    b0c3fcdb4e06d0afda8ba05788e8498720d511965408fa5723170766029d5094c536298f72a98902d5c4382612cfea00ac08e83f0b63dd42691c9a6002e79844

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    422e70f627457d2bc55225470c4ad00c

    SHA1

    ff00d533c1c1f7b580d5e33a625a2bd781348b9a

    SHA256

    f505b176d52d3f052a9ce0931ef2bf1d0484fb6b90d62a3476ebe64ca9d1688e

    SHA512

    d605055a1ae36abf4decf2efde7f740443fce7af74499fea06d9e60ca3b6df10965b7fbe1f895447df09339820fa0ff1d7301d32e103093400e148b134cc08d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b699f26304a7c4f08feb7bc7ffc86050

    SHA1

    1ee5bb98c18b7aae886d7432844b55be9497fd10

    SHA256

    37cd268e4f5f8ae9bb5615bac8920b1f068f8d387a3cd9b1acaea945b10aebcc

    SHA512

    7af297dff72ff04d3389027c4e72e10e8187384161fc1717d4c3f03fac85f8cae569c16279a0e7a8ec5e42125442cc7e820fa9842c01bd4ef5bcddd16debf4fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad0925bfe9d52109bb1047d4c6a754c7

    SHA1

    b0473952226221c905eaf72e8fd5bb9b11c8cfd0

    SHA256

    d995a6f70e34e8b727b6c227b3b96bf73a09111c6d742e3674d4819df183adcb

    SHA512

    77b30dc9e5748904068d9d86226245ce690ff5056e0506957bf798ee690dfbd16e4f601933de1d297af55fa4300e415f19f95f9e125ba4c953daaefba9cc9249

  • C:\Users\Admin\AppData\Local\Temp\CabAA94.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAAF5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2440-6-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2440-0-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2440-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2440-2-0x0000000000400000-0x0000000000506000-memory.dmp

    Filesize

    1.0MB

  • memory/2440-3-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2568-5-0x0000000000060000-0x0000000000166000-memory.dmp

    Filesize

    1.0MB