Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 10:13

General

  • Target

    d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe

  • Size

    710KB

  • MD5

    d91b90239fed7584c29c3719f6385f5e

  • SHA1

    8f9af181623a7523b6d952b5196e183152d1484f

  • SHA256

    cbd2721e10e05f934fe19a8801609614cfce89a5e4e7b6319ad71fdc5d7aa128

  • SHA512

    418274d3b4e74d77f3715dbedd3a85cb6c7793784b305604367d601649d95f0f37eb3a7d2bd02237ccf6b46c1744f02b6e02df14e631f9f5f15f55b38fa2acab

  • SSDEEP

    12288:etS5RTQ7aT7YilhjzAF4gv6tL1wURq93t5wGAT8oK:2c22T7BRS46k1BYhLATA

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24720444682a5df28b3923222a8f9471

    SHA1

    2694fc6a485cfd01a29952f49d11b1f48a2c60cb

    SHA256

    023060e345b31c11d26e10d286ed2355d1114f056a70cafc0d06d186fe8e3ca9

    SHA512

    5532a2f04071706cfa7d69226264534e7332cd28cf8458dec73f55bd7c31239cdcdad2dc9c1f60fffeacec832eb5ba91ac115787309186dfd4e95ef0f35d71bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f199f05895c12064f8cb8a6a7badc9cc

    SHA1

    4381a512627aa6a63f61fcc5a266feb003749d39

    SHA256

    4dc4389bf33fe214d7b50fab7b5565553a59ba155f09142231d3a2737f5e6870

    SHA512

    9ee91898735d85eeba76ba5269c2a7e934967790b419bf913f1b66a3171ac3b588f46a8a941a9462941e48d275f35523d2154929e77d7f33d01c73aa465113be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3cf998adc29ff1bab6e0a7dd7e82cb5

    SHA1

    4d203c32633429a791fc699dc2419a8015687133

    SHA256

    642c9ac83df5fff7a42b16162e40422ff1506934853f599b1afcaef3a3abd85c

    SHA512

    f052f588fcbbbc9f9f4cec682e58e46985103c0e6f88545ea553b83d1ccea9a6c514a9048359bef0e8a0316ffae54c85d758c8482acb37f9233925c15fee2b05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36c5e0fde6016151a7febaf35a5e44ae

    SHA1

    1f5e9482554d1db01eab9b690683489bd16b55e9

    SHA256

    25d5cbe9a851d8da386dc7ced9e51d50cfcb648bcab8d45327797599fc2e6f03

    SHA512

    0bc16a4cfdba5779f385070d964c4cdcb05fa4b98a6e43c2aada3f7db760cfa8d14428d8c95065c87c78cbe4c9f120ff939f495866b4ae6cf9ec7c2ece27d668

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1de64b155c7f1de5d3d8798310a9b4dc

    SHA1

    df97753e295052df2c7c0a7f7ec5d242c2a35ee9

    SHA256

    1558c0e0ada7e00e4698716320def99936723b230f5ff239d6fd3c9e1421a766

    SHA512

    083ff54bc8f2748d1c52aaadb137d830c96262dc98fbc0422cd031f4a453a7f0f4db82339730aea8fb879af78fe728da51cc67e4a897c0b6cf8fbcaf370c91a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7e5ced1994798ab76d5dec00af02df1

    SHA1

    5686ce8ad5bc9c91e0f94bdf8d67ba6acb15fed9

    SHA256

    ef5d18eed27427f9cf45b69bc9f81418ed1f85d613588fd7a413426f402ebd35

    SHA512

    a34896fc4f3243651363e2ec74db10f9cb2bc6d3722205a01dcd059a5d3caee7a1d0cbf780617a9570dbdf48a75401a584a2478997f34ba2132f4067143fa00b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    676afb94d6db49a3f4174cf5e2126ac0

    SHA1

    2ba9b498842939e4e8d2480e8dc68ab3004cf559

    SHA256

    d03b97d5fd162fefcfc846c84731a666b1aff5dfa10f6f62aee9845a96cd0f05

    SHA512

    02edcad3483b228787911de0cf6d811be4d6ac17161d83cd37fd69bd2f89867ddd5eb9f817d7077b0f068e031765c8efd5dc56f12df3b658a5db4dc0321e4396

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c10297ece7db489362d6f006e6b172c

    SHA1

    b0ef1efd4fad961ed0880dbafd2bedd1029e563a

    SHA256

    696c167791913f1580b5b369bb91f443b1953a82514298fe76221bb9f44464fb

    SHA512

    a8433f68a58b491d14f69a7331dbf341987e141481d5154c95ec8dfbc8047ead742acf59ba3c3ed99b06706ad9dde6807f06e5f90766abe0c865aac2fc6979cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64edb9c298a3a15bbcf34ad65a8aaca3

    SHA1

    b686f232e6210fcf6e2edae6d5f5603e0ae3b3ee

    SHA256

    78b90518e9015a903f537bf1105f9c350959bd82dba30c9bffc8017347e4b375

    SHA512

    6d9004bd2ead1cb46b9eea6819690ba185dc5ee6bcb692c3d7f78dc5b8d2a46101d5263497f2a6593bb05de36b0441276f8c6cbbcdc96be10edd1548ae8e4aeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    902694a35d0c0f7e6defb9bffc00d03f

    SHA1

    ac9c20aa7728db00509499e6ae3bdff1c43608a0

    SHA256

    8c97da62e05d56eb75f2606e368aa4100d85a55d13eb0de67dcb11a02d37377e

    SHA512

    8b05253ab54e43ab0ee79ae65d04ec390f28697f1141f80f5566d47d5e6dcb8adc82d24e7f79c8f1ce381ee217cc6658028e22e8fe606cad2030a44b6783161e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d381fc04e0de1e01f8820d77c25d580

    SHA1

    fb6675b05f91951c7b6d132717f9a522d8e78fce

    SHA256

    96a623568b406fa39ebd495ce9aee04203db03349cd532a14d3038d2278a169c

    SHA512

    83c570e8a4082827dfbc98802ad1431c51e7b43460ea720f03257efe10fa5ab82f2434f171cf51b3d1972c5c23a13c71dea0c8d186c3013154345c86fe921965

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8ef4365fce8c1ba35982cc7e7db41fa

    SHA1

    b730b97844c5cf61a2064be50bceffb0c7efb12f

    SHA256

    f038646826d1e8766c35c02e000d30d7c874d25b3ad17d5e2d6b5949a0e4718e

    SHA512

    184c5655355498c21b7f4cba1c11111ec81e56873cb40ff299ef59230e0f647b7f4ce3fbc81de58021dd74ab2e3ded30d6308149553d8cacd0c9e4c0a24c95c2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2eab5463526666b7e9b4f879c3d5bd9

    SHA1

    345ade8f3b08cfcbdce1fa8cff9520a8cbbbfcc7

    SHA256

    6d68405261f4e3c171423683bf87fccd9bdd3736d3b6be63150b321eaf15cac5

    SHA512

    6373c560a5f244c137f1d29f6d6e3580930387a78658cb1a84d10e2830df4b14cbe6e1bcd971ab01b8dd7d871ce9913357b06309bbc090d12b9f401615a10491

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97e12c16ffed838292416ffecc2a71ec

    SHA1

    c3cbd21219a5671da2e59bb8f6e9099da62fe8e3

    SHA256

    a1002da141503015cf35a70da1a5587ec899d5938350f0e1482be48a8a0f05d9

    SHA512

    571fd72086d8dbfea26b5900b8d619530669ec8341a48294e7d3d5db4ed6d941c2247b93406adc00cac25bf0af67d34cd1e2023cd31d6935a5b538e18fad5555

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b363a4936ef71866f957af20b31efcdb

    SHA1

    a8309e7fe1d7bad934f28934bbcae7fad30c3846

    SHA256

    993d77c4a94ae976bb84c76c3dda83afd43b9b7ada63a07bf989e7d192df5d8e

    SHA512

    4c1b19908239e2bf8f9d1c0acd5629965d9819b7710848e26744406085fca893ba893893934236bf2b8b18764f831fac402357d283dc04552aae867068363461

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5337686c5abf6dd6ab9aca4c6a2b1587

    SHA1

    80de2d7917bfe703ba0d1d1032f6187f7817987e

    SHA256

    405daa40ad90f3cef71f05fa76996668e095792387c2275f6d906203658c0215

    SHA512

    8ca587152f31d2d244b2b563af62a94a050f723929b0060351381c307e917e5524fb53f2764f6c0ef020a08268c29e3136ef0a7c9cfabc93bf171ffe41f67843

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    844470f84f290bf75ea4273b9a7f9e1a

    SHA1

    0c9cb26f43d0995824616f65707079d3a57179bb

    SHA256

    1b216a09d1d54f5fb02053a9b1c5162f96aa075537a6cf622ff0afdeed650645

    SHA512

    5c0bfbe53dd87c789b83f74476dd9bdec21f7e719ceb8c8f62c9244e3aca96a3b8ccecd42b9a00b4db272fe791fcd43aa2aeb208607eec8fba7b3f7c24510cff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe0755ba1521533814c645aa6b9f38d6

    SHA1

    98be9c1e23f9fbcb46e674e50634ffe2b1139119

    SHA256

    bceacdc17c28ad5064e05fb405ab159f8adaee910d76ea851ee5b2314996bdea

    SHA512

    f8f6302c345e8900c8bc3e340d84333beeb69dbc5514d057ae8181f758570db4b8cadbfc6308f9c968a439d5311bd1ae2a666e9be148d4f15bb66776eee06dc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd9c105717e7596f5c0f210ba2f8629c

    SHA1

    c8acff38735800cc338de26243ac31734955b857

    SHA256

    6c5ccc882d79415aecf41729833d64eb210493ad1c71a65bf6ca59bf5933358e

    SHA512

    5d65d3fbb9087a99166eb5126de37109eb5ef1df6b173b21ab9ad05955928539d5778b13df558a8c80fec064561511855325b31c3b9e5838a55b70dff55d77c6

  • C:\Users\Admin\AppData\Local\Temp\Cab34E7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3597.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1952-2-0x00000000001F0000-0x00000000002A8000-memory.dmp

    Filesize

    736KB

  • memory/2608-3-0x0000000000400000-0x00000000004B8000-memory.dmp

    Filesize

    736KB

  • memory/2608-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB