Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 18:16

General

  • Target

    c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe

  • Size

    708KB

  • MD5

    c8dcd363a277d0fb9b1edbab1c4f514f

  • SHA1

    67e93343a7b8188e937b131e0736ab7c7ba37ef0

  • SHA256

    e0ff592b195b3f5a040f6ba06eee7b3726657443017989245c486cf37bf6511a

  • SHA512

    1d0e32fe4a09818be43e411c5280ebc7dc0e0db3106bc8f4784afabbf1a1aae19cb9700616948915996efec36e0c7b3f31ef96acbe17f19229f73bacc93a9279

  • SSDEEP

    12288:tglx4CxSr1hKdOactGbPbo9Lb9zqS5flnyw1pra6iGR/TkuL:Gljx81hKdOalbPbo9H9WKyw11iGR/Tk6

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c8dcd363a277d0fb9b1edbab1c4f514f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa94be8347624d4c8b69cd38fa5d95a4

    SHA1

    ffef7fe41059d9a24e3db60ac194e05e5f41e98a

    SHA256

    2d348601adde7b99e39f44f833f68a2b66b0b0d20de905d94534070695bd507d

    SHA512

    0f570692b854434d397cad890cbe6cec7be84cdc4704e0f4511d447d2edc70786ddfa6a691af6212cdbae9d773b0470c0e3581868d6c7d0027489646b8012911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    290015f4234e29fc753ceeca48c14eab

    SHA1

    ac488a3b19f879ac9af1b46b193dd82c4142d4a3

    SHA256

    7dd9eb9daa7422d9778d83859a28aaa3b286b059b8cd13289cbd816362963d2b

    SHA512

    7a531312601c8646e43d485d58e5b843d8d729f09f10fc03a3f2f45b6dbac0a143d32fcdb1543ea47a0ffbbca352ab43ac4c50c2eb0a6928a309cb50e114c4a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87b0f846ce5b855fff8efbaa711da36e

    SHA1

    ff34e911c6a04fa089dfa66a532471e545201635

    SHA256

    f8e0e2ee1f41940173d835ead6b414db9a8e2b375a7aec75a8bdd20573294013

    SHA512

    cff2c1a9bee4bfd5aa88c3eded0970ac2deb942fb10be31ccca672258f9f3ad935afa0015def885d567cc92ca52da474747f9d43cb86185283719ac67b48225c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8de25d9eede6b7650ba815ec0d5fa972

    SHA1

    d735dcd66ac6d7f240612b5883613456bca26589

    SHA256

    077abce096ac1cb2413caec7a074208303b79aa647ff7a16926bf49ef5bf682d

    SHA512

    ac2ff81d70ea25d932116ca930ce8c6f2f8bdf0bdfc02d165c941a4990be46dfd2c18ef0e634b50235a6fe2b44674a3e356281cbfb58538f8569e98ca0e30daf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dec7179acdf2eb803179b3f0b57b80ee

    SHA1

    fbc332f9c294787d7afe2c0b1b69c66ef7d297cb

    SHA256

    4989fd7ca9fed67220ff0e8204272e425d0ad490ede049ac4733ec51d1b5da16

    SHA512

    2a955a20bd278ab81aa15acc803d015fe7ec6e946c35736f74e643371d9e76fab65eca444197aeb9b1cdecf976601fa98a2aba9a31b8cb5025211bd3f4051bbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aa9a876ff0cd7430a6290a405a1876f

    SHA1

    2e3bd986d786b250ea88b70aad3140095b4424ee

    SHA256

    fe851ca1e0e3541f0bbf7dca546cdbc3b4b7a948a0cb9049c1f763b25e53c944

    SHA512

    554b5ae3bfeffe8ece41382f8ac3b12653b9cbae88296ae56bda794072cb0e011faa027e868973db75e390f493bc0a572dff3f0c79b1b9c8e05f5d5087feb6c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d9db446d190fa8e13fa6ba020d9ad47

    SHA1

    ef48e3a5a8248763fe77bfba44717b02faca5a8e

    SHA256

    c0d3aafe1cbeec8977dead6f6471b814c109d1261565f44b746550cb48cdb607

    SHA512

    a4424de10bb2f58a27c6ea457141f7c3416e9889c2b68990df9d56ef92401a672cea2c9c907be77331e31b6a834ec0af14bd0f219dd105dc26936f74dfa47028

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89a44415ae747d55c812285024b485b2

    SHA1

    709c6a769565e4c235e75574f0cf4ef6e7a8f5d0

    SHA256

    9042959530af85d79f5621aff22d1315f46a915db3a5e14af50dab05d1e4afa6

    SHA512

    c5aaaad721416c86da57e5224ffe06a0c3e0df79ab99c2d4d8080e9eeb5c73cf7a3a06ea816747f8ad413d6c67e663ca9631a5282048f8ced9eaa1f22ae70303

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49d48f81dbcddc8bcc7478706c70f52b

    SHA1

    eb3c833e0fb38392f05e3162428068f6c5c070ff

    SHA256

    ce3012a25a48690d35c32024b93b07c614f34fb1bd142208dd9a234d46395c18

    SHA512

    bc1c2c1d81cdf20739d5fac1d15fabf5b2697dfe09fdbbf843f3a503538f20fe15ac93ccce15ebd771bf0f5b91016996f5d480d4da9a77296de664313c55c9cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8520f467dd740ba16424c22e2888cf23

    SHA1

    d0708d8fc9cdb6f879002a251fe730edeb7f3339

    SHA256

    69a80c54c8bceea15798cb8948954f793630902da0671781a4a5a492bb30d6f7

    SHA512

    3101c3897b48535d5871d0545ad8cac080ad835cf19aed5c1e482521b899026342c849838ff5d0cfcd322a9b1965e8753620512a34e4f33470cc17d8c05b2fa9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aca1bc492ac3cfeedddde07676f575ae

    SHA1

    0836bbe9ad537f6f6640945b3efe4024076e45e8

    SHA256

    10c1d9389c56291604e8ade5f5da8b718efb2f644e3b35bf86182b116dfe4dc4

    SHA512

    335e818aa050e4b99e65c5807c7f4376dcc24b6b0184a0bd9c868a2a281bac5c6e854f022032335961dad029651c33410385090e3baea19ec534fac05b542b5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e11dbe5ffcc9175a681fa5865dd71fc3

    SHA1

    1795f0ac10c6dfb19949d560d82997ff3024a538

    SHA256

    4d4b0441de9ab236156b8b465a6e25e29a62dd583f508bcda40955a5b4cbe8f4

    SHA512

    ee1be380a45d66e1f2cf0ba66b5cb4af7956f68aac6590df99391ca7b82beeac4e34756b51dee5157324c6d049c57152a09d1f06d2ddc7872d4cbc706718ae61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa28d21d3750884f2811a9720f49ebf9

    SHA1

    0620f1226a3c41d7bbdbb679993a257ac41a86f2

    SHA256

    ae561f5cd619c090f55baaee994f019d0abaa0d5dc47dd8325d0fe2328706b4c

    SHA512

    0120fe35637b4450984f1db756e328f69f890bd35f8f544560eda8dbf10609106e40040b2e3e8a47ef40bfee745b7e0717e34a03b2f1228cef9c528e67c41c5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c43d26aecc55d49b4e713f56facb03fd

    SHA1

    cd7155c408339a5ef9c314e866a8994fc520243c

    SHA256

    781a3b57dffa947fe022005581429999ea3a8888f636208faf6d13360feb984a

    SHA512

    a2dd5ce23afba7256bc2b3735ac851f7c609d0971b1eadfbba06c7991bae50ac683dd9b237dea5d1b8e3b6ff8cb95de96cda6d0e620576a0c301f337a7487e81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cd56d97bd243d88b7738576c637dbba

    SHA1

    fede37df8002f00d277cb06181854e4472d5784d

    SHA256

    597eb66577b02388d350fb07af76e7fa7f48b3a96981033feeaaf1b4d2484b5c

    SHA512

    915c6e5646bab703a4ba2f62de28516e906bdb1b932f556a17a841870d517a7f6b5243f6ae31ed05278a77a679fef0cf6890d8c8a998b1ad7f5bb09fe518f0f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81fd117f904996c98e2f0317bbd24c0f

    SHA1

    6198653c2d4e4fcc3828d9211015474a7d4fd33e

    SHA256

    a3e52b77d03bed907878ecc790a4da36153a20fdb6e0b4a8d108a4803bd987bf

    SHA512

    86aae75c01649c2860d2d0d6823159b0d32b63b9f31b7488dd85f43c367b512c9b124b7f650df7b40705caa20e62331bf76cd86359819cc443e05c8161d52449

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1fe8f3a1170cc1a0967a7c9e858df6b

    SHA1

    d59a448367248061c761fbd219d56a86da3e1ab7

    SHA256

    4da5160229ef42e105bc0f555720dd13450e73b2efffadb672503f95a14179d3

    SHA512

    2cb4c1773b5f9f35238944bca29e002a094c2a26c2209821a07dcb3b3246aa61cb88a437a4c416d93bc59d8d4ff9a4375dae7528b3e945813f5616533cddb943

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    063d3a1b476a13306653cf424751a42c

    SHA1

    6607f5751a07c624621232e156436e146755e6d2

    SHA256

    8fa6cf88e5198555186f1b76451a76abae225d2243ddb38fa831d9b34bcd6483

    SHA512

    85c21363015a8ec0c9dc6f2e354ddfbcf2bf3d7401691e52f981a5367fbae0c26399946595e31120ef4a28434f7fe67ebfd1c531c6e4868f2dfad74d2cbba7e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b40d93d9ed4b7bfb561fd0d096e5012

    SHA1

    d1a1b7828ec7a695cd5bf9fc7237ed8db940419a

    SHA256

    38e90f1e59ae224b6917cd646a393c8a7ee8637df443220b58a046f3271eb00b

    SHA512

    7e83f92762f994310efcef2be530d43c7b9890231105135e1f783b4b52f322907bb1d144d76d923134ab78a128f4ebcacb23cf89bc2c6db0f6b98a6559d2cf1e

  • C:\Users\Admin\AppData\Local\Temp\Cab9926.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar99E5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2156-3-0x0000000000060000-0x000000000011C000-memory.dmp

    Filesize

    752KB

  • memory/2596-2-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2596-5-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2596-0-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB