Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 18:16
Behavioral task
behavioral1
Sample
c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe
-
Size
708KB
-
MD5
c8dcd363a277d0fb9b1edbab1c4f514f
-
SHA1
67e93343a7b8188e937b131e0736ab7c7ba37ef0
-
SHA256
e0ff592b195b3f5a040f6ba06eee7b3726657443017989245c486cf37bf6511a
-
SHA512
1d0e32fe4a09818be43e411c5280ebc7dc0e0db3106bc8f4784afabbf1a1aae19cb9700616948915996efec36e0c7b3f31ef96acbe17f19229f73bacc93a9279
-
SSDEEP
12288:tglx4CxSr1hKdOactGbPbo9Lb9zqS5flnyw1pra6iGR/TkuL:Gljx81hKdOalbPbo9H9WKyw11iGR/Tk6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/2596-0-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 behavioral1/memory/2156-3-0x0000000000060000-0x000000000011C000-memory.dmp modiloader_stage2 behavioral1/memory/2596-5-0x0000000000400000-0x00000000004BC000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2596 set thread context of 2156 2596 c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\SetupWay.txt c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439584465" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{112A7341-B335-11EF-A567-DA9ECB958399} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2156 2596 c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2156 2596 c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2156 2596 c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2156 2596 c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2156 2596 c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe 30 PID 2156 wrote to memory of 2800 2156 IEXPLORE.EXE 31 PID 2156 wrote to memory of 2800 2156 IEXPLORE.EXE 31 PID 2156 wrote to memory of 2800 2156 IEXPLORE.EXE 31 PID 2156 wrote to memory of 2800 2156 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa94be8347624d4c8b69cd38fa5d95a4
SHA1ffef7fe41059d9a24e3db60ac194e05e5f41e98a
SHA2562d348601adde7b99e39f44f833f68a2b66b0b0d20de905d94534070695bd507d
SHA5120f570692b854434d397cad890cbe6cec7be84cdc4704e0f4511d447d2edc70786ddfa6a691af6212cdbae9d773b0470c0e3581868d6c7d0027489646b8012911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5290015f4234e29fc753ceeca48c14eab
SHA1ac488a3b19f879ac9af1b46b193dd82c4142d4a3
SHA2567dd9eb9daa7422d9778d83859a28aaa3b286b059b8cd13289cbd816362963d2b
SHA5127a531312601c8646e43d485d58e5b843d8d729f09f10fc03a3f2f45b6dbac0a143d32fcdb1543ea47a0ffbbca352ab43ac4c50c2eb0a6928a309cb50e114c4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587b0f846ce5b855fff8efbaa711da36e
SHA1ff34e911c6a04fa089dfa66a532471e545201635
SHA256f8e0e2ee1f41940173d835ead6b414db9a8e2b375a7aec75a8bdd20573294013
SHA512cff2c1a9bee4bfd5aa88c3eded0970ac2deb942fb10be31ccca672258f9f3ad935afa0015def885d567cc92ca52da474747f9d43cb86185283719ac67b48225c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58de25d9eede6b7650ba815ec0d5fa972
SHA1d735dcd66ac6d7f240612b5883613456bca26589
SHA256077abce096ac1cb2413caec7a074208303b79aa647ff7a16926bf49ef5bf682d
SHA512ac2ff81d70ea25d932116ca930ce8c6f2f8bdf0bdfc02d165c941a4990be46dfd2c18ef0e634b50235a6fe2b44674a3e356281cbfb58538f8569e98ca0e30daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec7179acdf2eb803179b3f0b57b80ee
SHA1fbc332f9c294787d7afe2c0b1b69c66ef7d297cb
SHA2564989fd7ca9fed67220ff0e8204272e425d0ad490ede049ac4733ec51d1b5da16
SHA5122a955a20bd278ab81aa15acc803d015fe7ec6e946c35736f74e643371d9e76fab65eca444197aeb9b1cdecf976601fa98a2aba9a31b8cb5025211bd3f4051bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa9a876ff0cd7430a6290a405a1876f
SHA12e3bd986d786b250ea88b70aad3140095b4424ee
SHA256fe851ca1e0e3541f0bbf7dca546cdbc3b4b7a948a0cb9049c1f763b25e53c944
SHA512554b5ae3bfeffe8ece41382f8ac3b12653b9cbae88296ae56bda794072cb0e011faa027e868973db75e390f493bc0a572dff3f0c79b1b9c8e05f5d5087feb6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d9db446d190fa8e13fa6ba020d9ad47
SHA1ef48e3a5a8248763fe77bfba44717b02faca5a8e
SHA256c0d3aafe1cbeec8977dead6f6471b814c109d1261565f44b746550cb48cdb607
SHA512a4424de10bb2f58a27c6ea457141f7c3416e9889c2b68990df9d56ef92401a672cea2c9c907be77331e31b6a834ec0af14bd0f219dd105dc26936f74dfa47028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589a44415ae747d55c812285024b485b2
SHA1709c6a769565e4c235e75574f0cf4ef6e7a8f5d0
SHA2569042959530af85d79f5621aff22d1315f46a915db3a5e14af50dab05d1e4afa6
SHA512c5aaaad721416c86da57e5224ffe06a0c3e0df79ab99c2d4d8080e9eeb5c73cf7a3a06ea816747f8ad413d6c67e663ca9631a5282048f8ced9eaa1f22ae70303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d48f81dbcddc8bcc7478706c70f52b
SHA1eb3c833e0fb38392f05e3162428068f6c5c070ff
SHA256ce3012a25a48690d35c32024b93b07c614f34fb1bd142208dd9a234d46395c18
SHA512bc1c2c1d81cdf20739d5fac1d15fabf5b2697dfe09fdbbf843f3a503538f20fe15ac93ccce15ebd771bf0f5b91016996f5d480d4da9a77296de664313c55c9cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58520f467dd740ba16424c22e2888cf23
SHA1d0708d8fc9cdb6f879002a251fe730edeb7f3339
SHA25669a80c54c8bceea15798cb8948954f793630902da0671781a4a5a492bb30d6f7
SHA5123101c3897b48535d5871d0545ad8cac080ad835cf19aed5c1e482521b899026342c849838ff5d0cfcd322a9b1965e8753620512a34e4f33470cc17d8c05b2fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca1bc492ac3cfeedddde07676f575ae
SHA10836bbe9ad537f6f6640945b3efe4024076e45e8
SHA25610c1d9389c56291604e8ade5f5da8b718efb2f644e3b35bf86182b116dfe4dc4
SHA512335e818aa050e4b99e65c5807c7f4376dcc24b6b0184a0bd9c868a2a281bac5c6e854f022032335961dad029651c33410385090e3baea19ec534fac05b542b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e11dbe5ffcc9175a681fa5865dd71fc3
SHA11795f0ac10c6dfb19949d560d82997ff3024a538
SHA2564d4b0441de9ab236156b8b465a6e25e29a62dd583f508bcda40955a5b4cbe8f4
SHA512ee1be380a45d66e1f2cf0ba66b5cb4af7956f68aac6590df99391ca7b82beeac4e34756b51dee5157324c6d049c57152a09d1f06d2ddc7872d4cbc706718ae61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa28d21d3750884f2811a9720f49ebf9
SHA10620f1226a3c41d7bbdbb679993a257ac41a86f2
SHA256ae561f5cd619c090f55baaee994f019d0abaa0d5dc47dd8325d0fe2328706b4c
SHA5120120fe35637b4450984f1db756e328f69f890bd35f8f544560eda8dbf10609106e40040b2e3e8a47ef40bfee745b7e0717e34a03b2f1228cef9c528e67c41c5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43d26aecc55d49b4e713f56facb03fd
SHA1cd7155c408339a5ef9c314e866a8994fc520243c
SHA256781a3b57dffa947fe022005581429999ea3a8888f636208faf6d13360feb984a
SHA512a2dd5ce23afba7256bc2b3735ac851f7c609d0971b1eadfbba06c7991bae50ac683dd9b237dea5d1b8e3b6ff8cb95de96cda6d0e620576a0c301f337a7487e81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd56d97bd243d88b7738576c637dbba
SHA1fede37df8002f00d277cb06181854e4472d5784d
SHA256597eb66577b02388d350fb07af76e7fa7f48b3a96981033feeaaf1b4d2484b5c
SHA512915c6e5646bab703a4ba2f62de28516e906bdb1b932f556a17a841870d517a7f6b5243f6ae31ed05278a77a679fef0cf6890d8c8a998b1ad7f5bb09fe518f0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fd117f904996c98e2f0317bbd24c0f
SHA16198653c2d4e4fcc3828d9211015474a7d4fd33e
SHA256a3e52b77d03bed907878ecc790a4da36153a20fdb6e0b4a8d108a4803bd987bf
SHA51286aae75c01649c2860d2d0d6823159b0d32b63b9f31b7488dd85f43c367b512c9b124b7f650df7b40705caa20e62331bf76cd86359819cc443e05c8161d52449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1fe8f3a1170cc1a0967a7c9e858df6b
SHA1d59a448367248061c761fbd219d56a86da3e1ab7
SHA2564da5160229ef42e105bc0f555720dd13450e73b2efffadb672503f95a14179d3
SHA5122cb4c1773b5f9f35238944bca29e002a094c2a26c2209821a07dcb3b3246aa61cb88a437a4c416d93bc59d8d4ff9a4375dae7528b3e945813f5616533cddb943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063d3a1b476a13306653cf424751a42c
SHA16607f5751a07c624621232e156436e146755e6d2
SHA2568fa6cf88e5198555186f1b76451a76abae225d2243ddb38fa831d9b34bcd6483
SHA51285c21363015a8ec0c9dc6f2e354ddfbcf2bf3d7401691e52f981a5367fbae0c26399946595e31120ef4a28434f7fe67ebfd1c531c6e4868f2dfad74d2cbba7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b40d93d9ed4b7bfb561fd0d096e5012
SHA1d1a1b7828ec7a695cd5bf9fc7237ed8db940419a
SHA25638e90f1e59ae224b6917cd646a393c8a7ee8637df443220b58a046f3271eb00b
SHA5127e83f92762f994310efcef2be530d43c7b9890231105135e1f783b4b52f322907bb1d144d76d923134ab78a128f4ebcacb23cf89bc2c6db0f6b98a6559d2cf1e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b