Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 10:13
Behavioral task
behavioral1
Sample
d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe
-
Size
710KB
-
MD5
d91b90239fed7584c29c3719f6385f5e
-
SHA1
8f9af181623a7523b6d952b5196e183152d1484f
-
SHA256
cbd2721e10e05f934fe19a8801609614cfce89a5e4e7b6319ad71fdc5d7aa128
-
SHA512
418274d3b4e74d77f3715dbedd3a85cb6c7793784b305604367d601649d95f0f37eb3a7d2bd02237ccf6b46c1744f02b6e02df14e631f9f5f15f55b38fa2acab
-
SSDEEP
12288:etS5RTQ7aT7YilhjzAF4gv6tL1wURq93t5wGAT8oK:2c22T7BRS46k1BYhLATA
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/1952-2-0x00000000001F0000-0x00000000002A8000-memory.dmp modiloader_stage2 behavioral1/memory/2608-3-0x0000000000400000-0x00000000004B8000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 1952 2608 d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\FieleWay.txt d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439901097" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4883FD01-B616-11EF-807F-4E1013F8E3B1} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1952 2608 d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe 30 PID 2608 wrote to memory of 1952 2608 d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe 30 PID 2608 wrote to memory of 1952 2608 d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe 30 PID 2608 wrote to memory of 1952 2608 d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe 30 PID 2608 wrote to memory of 1952 2608 d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe 30 PID 1952 wrote to memory of 2896 1952 IEXPLORE.EXE 31 PID 1952 wrote to memory of 2896 1952 IEXPLORE.EXE 31 PID 1952 wrote to memory of 2896 1952 IEXPLORE.EXE 31 PID 1952 wrote to memory of 2896 1952 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d91b90239fed7584c29c3719f6385f5e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524720444682a5df28b3923222a8f9471
SHA12694fc6a485cfd01a29952f49d11b1f48a2c60cb
SHA256023060e345b31c11d26e10d286ed2355d1114f056a70cafc0d06d186fe8e3ca9
SHA5125532a2f04071706cfa7d69226264534e7332cd28cf8458dec73f55bd7c31239cdcdad2dc9c1f60fffeacec832eb5ba91ac115787309186dfd4e95ef0f35d71bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f199f05895c12064f8cb8a6a7badc9cc
SHA14381a512627aa6a63f61fcc5a266feb003749d39
SHA2564dc4389bf33fe214d7b50fab7b5565553a59ba155f09142231d3a2737f5e6870
SHA5129ee91898735d85eeba76ba5269c2a7e934967790b419bf913f1b66a3171ac3b588f46a8a941a9462941e48d275f35523d2154929e77d7f33d01c73aa465113be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3cf998adc29ff1bab6e0a7dd7e82cb5
SHA14d203c32633429a791fc699dc2419a8015687133
SHA256642c9ac83df5fff7a42b16162e40422ff1506934853f599b1afcaef3a3abd85c
SHA512f052f588fcbbbc9f9f4cec682e58e46985103c0e6f88545ea553b83d1ccea9a6c514a9048359bef0e8a0316ffae54c85d758c8482acb37f9233925c15fee2b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c5e0fde6016151a7febaf35a5e44ae
SHA11f5e9482554d1db01eab9b690683489bd16b55e9
SHA25625d5cbe9a851d8da386dc7ced9e51d50cfcb648bcab8d45327797599fc2e6f03
SHA5120bc16a4cfdba5779f385070d964c4cdcb05fa4b98a6e43c2aada3f7db760cfa8d14428d8c95065c87c78cbe4c9f120ff939f495866b4ae6cf9ec7c2ece27d668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de64b155c7f1de5d3d8798310a9b4dc
SHA1df97753e295052df2c7c0a7f7ec5d242c2a35ee9
SHA2561558c0e0ada7e00e4698716320def99936723b230f5ff239d6fd3c9e1421a766
SHA512083ff54bc8f2748d1c52aaadb137d830c96262dc98fbc0422cd031f4a453a7f0f4db82339730aea8fb879af78fe728da51cc67e4a897c0b6cf8fbcaf370c91a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e5ced1994798ab76d5dec00af02df1
SHA15686ce8ad5bc9c91e0f94bdf8d67ba6acb15fed9
SHA256ef5d18eed27427f9cf45b69bc9f81418ed1f85d613588fd7a413426f402ebd35
SHA512a34896fc4f3243651363e2ec74db10f9cb2bc6d3722205a01dcd059a5d3caee7a1d0cbf780617a9570dbdf48a75401a584a2478997f34ba2132f4067143fa00b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676afb94d6db49a3f4174cf5e2126ac0
SHA12ba9b498842939e4e8d2480e8dc68ab3004cf559
SHA256d03b97d5fd162fefcfc846c84731a666b1aff5dfa10f6f62aee9845a96cd0f05
SHA51202edcad3483b228787911de0cf6d811be4d6ac17161d83cd37fd69bd2f89867ddd5eb9f817d7077b0f068e031765c8efd5dc56f12df3b658a5db4dc0321e4396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c10297ece7db489362d6f006e6b172c
SHA1b0ef1efd4fad961ed0880dbafd2bedd1029e563a
SHA256696c167791913f1580b5b369bb91f443b1953a82514298fe76221bb9f44464fb
SHA512a8433f68a58b491d14f69a7331dbf341987e141481d5154c95ec8dfbc8047ead742acf59ba3c3ed99b06706ad9dde6807f06e5f90766abe0c865aac2fc6979cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564edb9c298a3a15bbcf34ad65a8aaca3
SHA1b686f232e6210fcf6e2edae6d5f5603e0ae3b3ee
SHA25678b90518e9015a903f537bf1105f9c350959bd82dba30c9bffc8017347e4b375
SHA5126d9004bd2ead1cb46b9eea6819690ba185dc5ee6bcb692c3d7f78dc5b8d2a46101d5263497f2a6593bb05de36b0441276f8c6cbbcdc96be10edd1548ae8e4aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5902694a35d0c0f7e6defb9bffc00d03f
SHA1ac9c20aa7728db00509499e6ae3bdff1c43608a0
SHA2568c97da62e05d56eb75f2606e368aa4100d85a55d13eb0de67dcb11a02d37377e
SHA5128b05253ab54e43ab0ee79ae65d04ec390f28697f1141f80f5566d47d5e6dcb8adc82d24e7f79c8f1ce381ee217cc6658028e22e8fe606cad2030a44b6783161e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d381fc04e0de1e01f8820d77c25d580
SHA1fb6675b05f91951c7b6d132717f9a522d8e78fce
SHA25696a623568b406fa39ebd495ce9aee04203db03349cd532a14d3038d2278a169c
SHA51283c570e8a4082827dfbc98802ad1431c51e7b43460ea720f03257efe10fa5ab82f2434f171cf51b3d1972c5c23a13c71dea0c8d186c3013154345c86fe921965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ef4365fce8c1ba35982cc7e7db41fa
SHA1b730b97844c5cf61a2064be50bceffb0c7efb12f
SHA256f038646826d1e8766c35c02e000d30d7c874d25b3ad17d5e2d6b5949a0e4718e
SHA512184c5655355498c21b7f4cba1c11111ec81e56873cb40ff299ef59230e0f647b7f4ce3fbc81de58021dd74ab2e3ded30d6308149553d8cacd0c9e4c0a24c95c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2eab5463526666b7e9b4f879c3d5bd9
SHA1345ade8f3b08cfcbdce1fa8cff9520a8cbbbfcc7
SHA2566d68405261f4e3c171423683bf87fccd9bdd3736d3b6be63150b321eaf15cac5
SHA5126373c560a5f244c137f1d29f6d6e3580930387a78658cb1a84d10e2830df4b14cbe6e1bcd971ab01b8dd7d871ce9913357b06309bbc090d12b9f401615a10491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e12c16ffed838292416ffecc2a71ec
SHA1c3cbd21219a5671da2e59bb8f6e9099da62fe8e3
SHA256a1002da141503015cf35a70da1a5587ec899d5938350f0e1482be48a8a0f05d9
SHA512571fd72086d8dbfea26b5900b8d619530669ec8341a48294e7d3d5db4ed6d941c2247b93406adc00cac25bf0af67d34cd1e2023cd31d6935a5b538e18fad5555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b363a4936ef71866f957af20b31efcdb
SHA1a8309e7fe1d7bad934f28934bbcae7fad30c3846
SHA256993d77c4a94ae976bb84c76c3dda83afd43b9b7ada63a07bf989e7d192df5d8e
SHA5124c1b19908239e2bf8f9d1c0acd5629965d9819b7710848e26744406085fca893ba893893934236bf2b8b18764f831fac402357d283dc04552aae867068363461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55337686c5abf6dd6ab9aca4c6a2b1587
SHA180de2d7917bfe703ba0d1d1032f6187f7817987e
SHA256405daa40ad90f3cef71f05fa76996668e095792387c2275f6d906203658c0215
SHA5128ca587152f31d2d244b2b563af62a94a050f723929b0060351381c307e917e5524fb53f2764f6c0ef020a08268c29e3136ef0a7c9cfabc93bf171ffe41f67843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844470f84f290bf75ea4273b9a7f9e1a
SHA10c9cb26f43d0995824616f65707079d3a57179bb
SHA2561b216a09d1d54f5fb02053a9b1c5162f96aa075537a6cf622ff0afdeed650645
SHA5125c0bfbe53dd87c789b83f74476dd9bdec21f7e719ceb8c8f62c9244e3aca96a3b8ccecd42b9a00b4db272fe791fcd43aa2aeb208607eec8fba7b3f7c24510cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0755ba1521533814c645aa6b9f38d6
SHA198be9c1e23f9fbcb46e674e50634ffe2b1139119
SHA256bceacdc17c28ad5064e05fb405ab159f8adaee910d76ea851ee5b2314996bdea
SHA512f8f6302c345e8900c8bc3e340d84333beeb69dbc5514d057ae8181f758570db4b8cadbfc6308f9c968a439d5311bd1ae2a666e9be148d4f15bb66776eee06dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd9c105717e7596f5c0f210ba2f8629c
SHA1c8acff38735800cc338de26243ac31734955b857
SHA2566c5ccc882d79415aecf41729833d64eb210493ad1c71a65bf6ca59bf5933358e
SHA5125d65d3fbb9087a99166eb5126de37109eb5ef1df6b173b21ab9ad05955928539d5778b13df558a8c80fec064561511855325b31c3b9e5838a55b70dff55d77c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b