Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 22:42

General

  • Target

    c9b9020e065b5401d3cb7b24665cdbc1_JaffaCakes118.exe

  • Size

    840KB

  • MD5

    c9b9020e065b5401d3cb7b24665cdbc1

  • SHA1

    67f3a416d5b0351d5721905f00bc3576fe43c132

  • SHA256

    f6b37740834dbbd92b858e3491df921ac914f5e85693f716fc6a872eca46bfe7

  • SHA512

    69de096b0d58a7ff9d6be04c1912fdd32d87e13b0d3fcc0cac7f911794262891d2ab9f63a0901ab844a05d72fc7b8b235e9e4653f20be085102c7b63d3059280

  • SSDEEP

    24576:xmw3sGTlG/C/WZyKjoX7owiUY4pG/d4lUbo:xAGTlG/C/2yEk5MM

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9b9020e065b5401d3cb7b24665cdbc1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c9b9020e065b5401d3cb7b24665cdbc1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\c9b9020e065b5401d3cb7b24665cdbc1_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\c9b9020e065b5401d3cb7b24665cdbc1_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d949334fcba425f2d10c091f6949ea9

    SHA1

    a4984fd8f3b2774604176a6e8c3b61d56cfb9156

    SHA256

    c0fa8427c1411cccd1841316df235fb77a3506d8a35ddaf3d37ac815ab768169

    SHA512

    f698eec6adefa35be3336be2e50f5eb7c05d4d9687b4a8e9a549dfd10064cc5a491a415298efd3f5ca753fd977076167aacc0f4c530e8c9208ae388781bf9b7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    77f4ac8e6fd9443c863974ba024de16d

    SHA1

    2da4dc732a48a1c4aef2c04d7c8a89f42e428509

    SHA256

    e6b204653e04fed67d5a3c7517982d2a5170f97f1e7ebef1932394f065d122b9

    SHA512

    46a0328724855ecdf73813e8973e8887c53d46f0b26136778bed5ca4da67f1b5787cd2690f3549b7ee32529f53b1d20390a4652464a22e496230d7b6331bbcd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a706539ee5fae987753476b13464a766

    SHA1

    4704b90535c3db5dc0fa8adc2149da6aea959d2f

    SHA256

    d5708937d3ff2f9476a2db5f187b72d70d23789c1d0e698353d45edbed689fe9

    SHA512

    3795083eab40e533e3531461b49f579688953e83ba283b0e5e1741845601fdbfafb262ef7f8c7cf6c236e967b57a5304fd116be9f337018d4442239772153b1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f70d64474bae825ffbbd8b1a4abea8df

    SHA1

    fd8c57d92c6636a0e4847b85a5553138e94523a5

    SHA256

    9244deb9e373136643b1d6a804f378e66811d92da635b7ff2ee5bf057d8fcfdd

    SHA512

    a3e85d2a78c3710dc8395e74d55ac25147a4088b0224135400387f20f221ea95d75eda56a4a5910b4ce548af5d02129f2afe66fc06607d07add4619281b113e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3ca52500959704f4b20cd90311d14d1

    SHA1

    9f318a771cb6e44f65d39018a5efb21940688745

    SHA256

    2d09d8de7657e4e3db03c47cf940479b4971f21a922d9366e36f02b5cb4c0397

    SHA512

    9732f9cde47fc718bdb3c89369736028945dc49d640a7073daf0c63e5adfe3dc193f302723edb23cadf49c08e5dabd92d7e98a2c5f16d785bdbed5e583bd86a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee09be4a8ad78addfd5f730b73c6ba7f

    SHA1

    0c773643ed23be105f53d848a154071f6a8d6902

    SHA256

    bf079ea9d885fdef7f35bc5058001ecb197d3d3914875d6064cf3bd496b99f4d

    SHA512

    2998b333becefbafadf53fea42e41f3f2b33754930a8ed30f0d278c6e63fb43a6de39cae6b03d11afb04789b67ff27467d1073991772bc44ff8d0f8892285b62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f79a016d842cf4727cd3ac601b010898

    SHA1

    62331e9ee446568648822bc1d2c757b8ce35a8c9

    SHA256

    eee2133eab45b4e24eba9c8080b9cbf58693ab4883cb8b9284f42a12fc423cd7

    SHA512

    4488e1c8ea2732542c12939e7e527499bf86ec338352f48ee0fbf5d6d8b5bd620902ec3ead3c2aa68844fd3eb441ce95c8cd3156444ad229def23643bf0615b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea9adf005feac4607f7fa7ebc1012b5d

    SHA1

    6305d18b53191c517c55e58b480ed1d91d145ad7

    SHA256

    6a9e64ce42c6a58791b2e2e33d8c7f4c3f33e5fadf340527c22540270c928ec6

    SHA512

    6009ad0fb8550161763d45a0efd7d4585bc56895494295ef5d47fbfa5b6903eb9f5a5d0d72d0dbee2238a07f83a09375b9c533cc05bd26da70457f371af148b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbb35eff3d965f16ebab97e686bbb583

    SHA1

    55beab8dacebb411973d7c00092433a384696877

    SHA256

    239b595049afece6ab941b4e77a5f21f2b9b6c8ad393faab24cecc9a80ed9cfb

    SHA512

    b8410876b3681a4b950973415026ad9af7c7637fd514cb5021320674dabe2807c3e1589a0ca506537b6bce4ed44f61259e1a2a4a531e5850b1a312b418c053ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04ed5d11302c74d27d5ecff49927bf87

    SHA1

    d68d4a0bb381b359088cca064e10ae25877de387

    SHA256

    17ebed16400588e382f9dee4b33feec999316a4618f92ac360593f3d0a6403f0

    SHA512

    edfe78cbc57520305e305b8150107d3c3d562f35f2d5064329a575e9fc6930358dca62116b890752e53d628f9a6407616dd9ff4104f4f23df1fbec78ecaa4787

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59032539866100ad48028c4dc9b9fcfa

    SHA1

    dcdb6f3c5860b5a4ab22c7cadcdd827df30da74d

    SHA256

    923a15aa311c84178af058cfe2939777494b4d7c788932e28f746a6f4fa5654f

    SHA512

    8f80df01bde88adaa3a2d11b18af1bb2a13063d6bc8e02fa0016bc2167500d131648079dd127c6eb5ac396161b8633b58b12759999a866ffa489c0449d7c1a5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a972d0ed9461ac733011335176809fd

    SHA1

    620252bdecdb64ae48f3cf4c91dc577d7f6316b9

    SHA256

    71ecf44a8fd7bc3cdb4d9e429bed2709f1663daa0bdddbe4d41569021eb9b44d

    SHA512

    d35c6062953df2b4dc9bcacb2ad8ba90c96e795f141359ee25cf1173f61921d8099efe78a5889d68843ded4b52f0b5d28fc3aec8cc9ffaaf792a66ee62eaf627

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    048c198b5bd842e2aec3bad5dc2d3c8d

    SHA1

    3bfa8f6dda9d2d0c0850da4fbe8353b975023978

    SHA256

    5bd730f66c1fa28a86a552462812b9c0b3b5a6d5e8a6ba9252abafff578d3968

    SHA512

    a10b68b9245fc3d46ae81b76e1628e8a5a880e1ec5e49cb8764d6db0d419f5a19504e4f23a3bdd3f5a1304523ea203e4d4672ca428e847c923df0dac9cf1c03c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    577cc2fc15dc7a4ae94bd995be2e9246

    SHA1

    0031efe06a22f1e37d39b78f25bf035284df2b71

    SHA256

    c3a2934beab089d9c6568b59f75261175309af26bd75a4c9edd8476eade0579b

    SHA512

    b0c1d362a0e2dd40b0eca7779bddd5ddcaca4d51224dc1f0f8cb96e7197932a512cdc080bcca8bef61dd49f403c56ad8710c4a4eb074b83796ac48e7878acc52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1045267e381af9e5f41831d15e8b0b95

    SHA1

    453e98e38ba7f03c4b1ce104b1f14bb2c1a48ebf

    SHA256

    0e43261a31931b8e56e14034d215ea970e81cfd1d082717629aacad089dfa57c

    SHA512

    6400b31f66094525ddeff16e097d26d19c95e0ef073030664de8211842beec3d20406bb853472de3125f18b4370df499ee848cf244fe0946cd998e8dd21b1c45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    168186efda6abbd60c01f1e47e068c5e

    SHA1

    b9209070f5661c31c61095d7f678b4e9dc7981f2

    SHA256

    cc79915b3820d56942821de3634bdaebb764068f29651e6e211a2375f6de1994

    SHA512

    43f01825f70f08e17a0e7a70905d35f423f6a58b404e926fad14a430a2829ea4607ec64b0de5f780b6f3b3ae1ee45a9409b9b073281c004eb3fe2b57af7601a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de4a71c035d1a8da4fec7c723feb6841

    SHA1

    a51743c0e92526f15d35fdd6d32eb6e5af484d4d

    SHA256

    5ccde9c724a62483f75070b422cb80669772e43148504f0eb22f8d5e7a4b0e9c

    SHA512

    e823fe7500ef0d1a65898dae19f3d87a9b3e53322ce490f97c735743807bf796740c724123f2cf83e04aef41a435f47d21ed28389c7e018dd163818c3c3333f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37465960a7b428745ef1907b0cb51c01

    SHA1

    749c7a875c82284b10e6ac65e0580625f4540da6

    SHA256

    ff0b467f760facf0be941ef571f9d625dacf64d6bd3056eb788d4e3da78e1fe2

    SHA512

    089f14bad869fb0f19f8cecd8474edd57dd9b9687ff75a504f6325e1335e79ee00ed18050498df0c50062a15bb70c8477eae0fb87fc1f37011adbda96f98e39f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b2b3a77fd582cbcc1208b23c562ccab

    SHA1

    ecee6a2a0c0b1215b5ffc0f06e93feda63aee9b2

    SHA256

    a3648759f44e794584383c3ace1da35c6a877d9087fadf774602dbf2b804552f

    SHA512

    85fb4a895fb45286eeb9264a7ba3ba435fa8d67ef219b76e4d11a5a7d1aca15cffd0ac06a98bb9f236d0b2dcf67873eb789a9f876dd305dee61bf033089c0409

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07bd1b471f8b8676988e56309da39345

    SHA1

    c556a5310fdb63b135e00d8108cd5a87c05baf76

    SHA256

    26552ad188048204738fc19d36d6ea14476bb1a37b331499eca33487d02b6db9

    SHA512

    aeb5f827337866f654ef47784cd6cd551c9dad8c1b0d5343d24e0835f134c367ed7b5a5ba9a247c77a6b14779a72b242263533f8009c234c2cee32800a3ca20e

  • C:\Users\Admin\AppData\Local\Temp\CabB148.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB216.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2092-5-0x0000000002050000-0x00000000021F5000-memory.dmp

    Filesize

    1.6MB

  • memory/2092-0-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2092-1-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2092-2-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2092-6-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/2176-10-0x00000000001C0000-0x0000000000365000-memory.dmp

    Filesize

    1.6MB

  • memory/2552-379-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2552-11-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2552-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2552-7-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2552-8-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2552-13-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB