Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 10:11

General

  • Target

    e0f9839fbd598b6a2c3c290057545cda_JaffaCakes118.exe

  • Size

    721KB

  • MD5

    e0f9839fbd598b6a2c3c290057545cda

  • SHA1

    ab74a05248235683f8f61fbdee68d39fa98a9da1

  • SHA256

    6f9be6027a5fb140b83c288f832a230481398c2ac95de30e671ef3662336cfbb

  • SHA512

    4b129cb08479d13d2e6ac109720ebe1a79056b6b90b94bf0fc8e47b6319494126c830a1e6b7a6206b90f1818999bf2bdd9b3a0ef348db1b30510e74e122f6eee

  • SSDEEP

    12288:XqNRWtGWTqHO+oW3HVjIwBY0dVoEciFLE20Qs8XPPt6dEmc3G5Kbl99CTgQAWeBt:XqNRWtGWTqHO+oW3HVjbBY0voEXFLE21

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0f9839fbd598b6a2c3c290057545cda_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e0f9839fbd598b6a2c3c290057545cda_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\e0f9839fbd598b6a2c3c290057545cda_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e0f9839fbd598b6a2c3c290057545cda_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0334a361c5efe04fa06b794c1001bba1

    SHA1

    52bd9da11926ff321c6e916aa5e85187a253e098

    SHA256

    931cb71639d8939aab2046c38577760b8a5c85c124c30886555bc6a3ea00446f

    SHA512

    68623746ca1b27e1be686c0c73fa122bc527951842b86cb3f3de50380e92758c51deac9d68830df186567fbe1ed19cfa7a3db37341950a152484a0b96db2acda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2952f5f818bb1cc177957509279c4dcf

    SHA1

    6526a8d4419d6c1a596d024c9f21346a8402eb47

    SHA256

    4345b4a7bfffbcab65c385fa44b6fb1d9278358a5560b2a95424b0095eabf05c

    SHA512

    a7711806b0502775e52bbaaefd89d8ffc3adeefa37a6dcefe501b530ae2e7a052c782365fd10471f40b23eb5088a4297cad69fe923f853d04138996fe3c7f785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    231681fc6ca16d44866e98565e56278c

    SHA1

    a8ba4f7a46696aa8e4e32f367513b152bdb99289

    SHA256

    f44fc04e1f833fb4cdb54adc2c054960031e4a19e014354731fd3023db6f572c

    SHA512

    9cbe66f7b4b0090d7daf73873fb3173a34d06fa6b9fc4ace529d60ba28f9cf7112eba3e134b6fe5cefeae27b497b8e43ba692a07baee306e721292adddd5c3f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    961b82ba2c9d1665bc1f2cead4fd7cf0

    SHA1

    b5d4c4d5edd9b99d2d32911b392f3e71b138d096

    SHA256

    0df4141bcb6422ce9f95872d95b7c740a0a8dabdcb09c5ada80529b10c4c74a0

    SHA512

    6ce8f9f60823b29d643045f369a52a4b1392072c190bcbbbce6b7dfab254b9de287920d8ce736d00b4702d367b32055ad116209647f7eaf2fa49752923a0b793

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0e751f95ee7c0784971636f5464be81

    SHA1

    b115e88d39b6303373ed32c48de2681dec8b9b3b

    SHA256

    b0dd369c3a1cc6cc08f28a8c3369c22b2b3220e97a3afc65eefd3b3d01fae983

    SHA512

    29a96bd80dad4c0712e6dc65e3ca747d5dfde4f05768e79855a9aefb720f8b6cc818623bb958ba911be1d8cbb65666a2fbe0edc6e82c27bc3cb1ca1f468f8c2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    237bce2c4f953437c92583ab9cae0294

    SHA1

    2b5d4e11d6102772fc070dd042b727d38569c868

    SHA256

    6c97aef2a2f5d34a995f0ed9834851657486eee4f4c1340031c69ff18ec4d2bb

    SHA512

    d7b242afbc151f3654cfa2568f5358b369c7d836b11f775aec9a20c5469c9385fe4a5eebde206f62ac44696996c3217be51df8e7f7d657282ab47cacd9b10255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f799f76459a8c0047e807570c4b700d5

    SHA1

    e7dcb820c1a5674cdd6ee518a9c0cea4fb9b1005

    SHA256

    a725dc72786f5754339a5b01478ed1489e1726f2f442493f2a7324eabd907250

    SHA512

    941af420ef433bc39ef254a3b89c0dcb7655a29aafcd221b581e9b66f8d967ee3e12f437107613beba5e0f9b36ff34607fe00db3e6b85bde36d0d029db2c919d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbcb86f6e37d72ed8a1268f108b3aec3

    SHA1

    2f52b11f9b637e8309357b2e764222ff1a4bc87a

    SHA256

    e656d4f5092c5964d49a5b02c7b8bcd04d07875eb493f2dc8adebfa9eaec4710

    SHA512

    65b7657b8e1be34214b9d9d5905e759275a892f61e416166bc59b0e5d890ee65ba74c12bb202dadefe87a31d21e4760665194491fb24aa732c1126948b74cecc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    917da1f16b3b46446bc05a54573b633f

    SHA1

    5a9f498ae504ec85eec1d155e6029521f745f528

    SHA256

    2c6350d2d595d88ae6e1f8b71c377f87ed7f978cde96430a96f3b2a198ad9844

    SHA512

    275a63d0ad817c9fe42880fbfef5b7b74cb5c31686d23ebcc94c67724a1f45ff1ee59479395422038a54872b353f35eff630eed9237e4041858be13d241bdc17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f9553f5595f91132f685eb10b4f1bae

    SHA1

    df7b2c209200c37f79d70db180f49ccc01c47afa

    SHA256

    0544d52de7dcd444fc47def9d079c63d29c264801d183950ec6a0a74a2530273

    SHA512

    1ca8f45e350b9edccfdac191d5c7e0ee13772beebddb496a5fa76432d36a868c31136542ec8c6e1da056f35072d0eecc5b13f4a40f5a2faff720bf7b3015d050

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9915de0bff3a0aacc4b04cd0bb65132f

    SHA1

    2626d2cb7e62814ef7e799f05bf164ab85091f85

    SHA256

    5f5906016350cddfc64ad96d91ad9f55202ab18cacefba5a46cffd784f7d45d8

    SHA512

    5e7c7003379e61674c042c742ef7da7a775871dec08325c2c4fb44f297e53806e529502d8a61617b51a2119c3ae6829b63969a6613f112a49a22041b9f8f0bdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6eab0cd59669af91b65c000eafd5a493

    SHA1

    2e484eb88ac87a4f977e46eb7f14e58b0fabd72e

    SHA256

    bd6f7f55ebdab33f22b1e00d9c9453c24fd33944cd1cc14ea9422984db911cf1

    SHA512

    d06d8c0a2bedad78271584bec1a3e12ea635a3b9cf3492253435dc6918fa7c483e73a75ae915eb251fd47f72d4f1747b5e8d03f65de7e55f02a1fc9b8bca3dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    060b3786f4ac416f02b876651a399028

    SHA1

    50c5f76c245da2334e26538509e75ebb2635361c

    SHA256

    340ca5147f9226e0fa2decec1a1258f5dad0b188a35b77423a5d870c475494dd

    SHA512

    7f0b07e0069f71af042e747554bccc9df031675651dfeb0e8a7a951e6ddfd187f1df4fef32ad20861785fc46d48d5aebe9412bc3d4e31cba0cc70c57743e1561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72cba53a9d497870e36db67827edb916

    SHA1

    7dc6352f0b91b8934fe20c540f1a7c9caf8f2f59

    SHA256

    593a129146ee3a447df07a6f1adaf94beafcc70f2ed5bbc88ed349631702c5bf

    SHA512

    a0fb86c37e15a0d90bec8539de9d563b5a149cbd8850ae6b6a50cc926f873507caa7f93d96e2faedb849103c6e22bf42243988071be8782dcf039706d0ca4b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc27d12cb72326f4a7143b16d3de7a88

    SHA1

    9623e9a73645382cae2f72ef418cdeb3345aeb84

    SHA256

    0e593f4799e8ac9304603fdbfbd2c45c839404610b5693e7dca79a068e61ed07

    SHA512

    8c185a384a4408711055527febcec7b7ee712ac38fc69f21f8f0b6a49285e6f265982c699e5d40fa72ce58e48afebe8e1e40d492ef3af9c85b36c01c1e09a7a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1ad5b111ee441fdb2551c7112e801fb

    SHA1

    6f62d61ce59badeccf790b6c5417b29de85985be

    SHA256

    10f3fc64f3067b91ac3008b4f05dd07efb9286c189bad2698ba9848f41a88eca

    SHA512

    dae37c57cbc69b912f085a12c4354b2fac0f6a0c79bab31239c4665175db32830643dd32a23a8f25cb897e6e1dfa6d3214053e0633815c12b8ad5e492ceb06c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    729c33d44143c534d5cde290d8037cc6

    SHA1

    046320b5aae0862ded53f89abacfb9bcc4bc5cc5

    SHA256

    94ea39dde71604d941693aa17cb3448f268294bc785a0cec18f45daffb285674

    SHA512

    a67961840d149db3a3ae35066753494a1df49bef96d9fab26ab9635b7ec033eabd6d17a82c0f5c0d5635f485026b7f53f5c2c0ea628d4f16f816ae358e1c714f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81e4a2dd2c8e0407a3cd585e704e4612

    SHA1

    0f2493945b1972150564e17376d3b97c36292d54

    SHA256

    012ea88ea6982b246eee9889fe48c7910b27564e5e7dc5b7f8aaf6cc98c58bc9

    SHA512

    90d84b418f7e5893781175842dd1e8cea2d668780391b5fa54728e76551613a8b5acb5d204d1ec794a288303ebe7fc167c0f3d3e7490d23b5ef20dafc9d92e01

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ad91ae48fd96746dc03b70562007cb8

    SHA1

    376936896cb564fd99f3f4a1d8936d6d85b44079

    SHA256

    346a7956fbb91a9edeb911c54f31157a8237ce40fc3da482c6f0335b1b22ce03

    SHA512

    3d72808a36383ceeb6cf9f7a13afea54a038c7b8c1e23a523f788e045f7fda553b9769308958e6f9e09989b32b26452d928a3ec55586e14fa8cb0149ecb00bbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13d87d33f3cd0286bdfb1621b5e77b1e

    SHA1

    63e14a302d147d9fb2e97fcddfecf06829b91240

    SHA256

    11d31cc5a5bd24826c364fa02a1de46d3720751178cd876d94bee51a4cbbf667

    SHA512

    241b7c9b2bed295282a9d007558c1a2a4ff472c656218afcc1701251951f8023426a50ac8930d38fe562d3db282d4b3336b94a2e6b67d601f74138ac5fce0911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cde08dc9133cf73bee6fdbf36d09cdaf

    SHA1

    3f81012f501816f5a008d16ae51ac31096c963f1

    SHA256

    2e42db1614a9b3574e569a31e6a2803ff4b52a8b2b7449242157c507b9073596

    SHA512

    a610246cf5a3c2ef98ef1b3abebc15ca42170b78c9db70ca4b40e435680f6151737a30f71e04819d9a4f7403d7b2478d15700611bf66ad316551351f80b3dcec

  • C:\Users\Admin\AppData\Local\Temp\CabA0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar14E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2112-9-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-7-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-4-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-2-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2112-8-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-10-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-11-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2112-14-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2724-5-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2916-13-0x0000000000170000-0x000000000022B000-memory.dmp

    Filesize

    748KB