Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe
-
Size
730KB
-
MD5
e2e888f574a744c715f3715a2a1aad5e
-
SHA1
e6500e23a4ef1080617d3e77d3bebb7ff9b81142
-
SHA256
aad420ae73ff2d40ec364688fbf67edbee7fe5c32aac66adf811bb551d5697b1
-
SHA512
d709dbd840814fcd154c8087c4157cb3c95623c10c61595bdaa129fdbf57185d8962fc23c4b271c1722271c4baba2752e07685d38c42c60149d72411c22a1edc
-
SSDEEP
12288:Wc//////jr00msiGLOV4gf0PegUbPcRLw26m0P5xYSNtcLsV+yh1b:Wc//////jrVKb/fwegUbczQ/YSNtcLhG
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 8 IoCs
resource yara_rule behavioral1/memory/2056-7-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2056-6-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2056-4-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2056-8-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2056-9-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2056-15-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2056-11-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2056-444-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1992 set thread context of 2056 1992 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 30 PID 2056 set thread context of 2220 2056 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6FC3A21-B87B-11EF-ABB3-E67A421F41DB} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440164677" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 IEXPLORE.EXE 2220 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2056 1992 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2056 1992 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2056 1992 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2056 1992 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2056 1992 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 30 PID 1992 wrote to memory of 2056 1992 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2220 2056 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2220 2056 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2220 2056 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2220 2056 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2220 2056 e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe 31 PID 2220 wrote to memory of 2904 2220 IEXPLORE.EXE 32 PID 2220 wrote to memory of 2904 2220 IEXPLORE.EXE 32 PID 2220 wrote to memory of 2904 2220 IEXPLORE.EXE 32 PID 2220 wrote to memory of 2904 2220 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ed4b55120ff973d8ff29e1c80a61de
SHA152a65720192ddeaed2d7b46bb62d620a9e8ac72c
SHA25608c310a9aa2351f522c4e710970cc2f14a983e9c12ce2bc69ac55bb2c558a245
SHA512e246e17dace6a0e58d579a015536dd9655681bf9c84e6e39d766a1f4d1cfa3125a6fc6291720a489c024a339b17a7dd34a11f20b825cbd8761d719662e0a2570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54690ed34aaa4bb0520ab7517750a1a5c
SHA11cf051cca6f87c48a7e5702616613167d9e0371c
SHA2569aace362dc01b8633f72961dad1f446d0de06a2f32c56023f7e0eacaf993aac9
SHA51243b681dd615779fe198320fd06c039a4eb781aeec2ba4a0144daa4447f831293ab7bd2248b27653941789ec3cec7230de6cdfbd0089773dfc493ac25c806c694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d414f96d9a1d8eac6da44a4bc00f0a0e
SHA13d014c6f5f1ae60b3c28fdaee384d8d345b08949
SHA2562c0466677d4b76f31898164d05d8c37f3fdff7c8956b6304506c7898d4d777f3
SHA5126a0b69dc446ddd11331ccd4d0bffd7a9560ba71daf41b2b5fbdd06e47fe614de3bb9a9a4d1333d7286459d2b7b2f991bcd4fe45ca1f88e4f78fb4579b61cd2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad8db81594aec2dffdaa45c9e04da39
SHA1dfe63928a68dae78125d8751943e4fa314531859
SHA25692cd5854e7d8ab95bb78ea9a0cf7a6ee11deb37ec90dcbcdecb64aba5768fe85
SHA5128c3bffafdc7a73275f09ce575cb60a48256d5cffbff252270bd99001ea611fa65dd80dbc0e4a364375b6b0f1a05ec260f6b33da556223c0a596eadbc39723734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c1fb9bf7f4fbb279222334a679aac6
SHA1dcf65510ed94b2d665e49e5a22be410912622745
SHA256c056c43f63390be9163c88a06ccad8da1d81ba850057f72a24201733946cef6f
SHA5129df07b3665db133ad609e509c3642e7152767d11d0f9254f53143d16f4ec7c58d56754f4e7e3fbbb6b0b54d54eb82b58fb824c0fc8181e3539b11b644303ccc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8312078402c95e32489f88ec10d0581
SHA144eb0787ca6ef8a282888b2676deaa24c477f378
SHA256fe4000e68c8ef6d11334fbe3880aa96ee2f796afa1639dbb60fb9fbd8bd18440
SHA512e54416649390a96a495c29d06d3921acddad87b667e03410a22c16777ef908d898bfa1c0ca03cebf10479517e213d6b1d8936cd509b3e2c2f73eccc06ec8651f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0fb69284f4bfc6627631c1c0e2360ab
SHA1a0001b4608defdce784bc90d155da08a9e266957
SHA256fbe352b2b859e11422fca4e766b0b487143b53222f05b7bab0c2257965f2a6e3
SHA512e2bfbe0c6dfae612489fcf8aed5162be5a9724b3eb8e298feb14c08b23b9d8833cede09993f5edc1da30efa2cd68a618981529ecb2d834a3f7967dfdd62c3ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57154bb07db126d8a59d8d8c2a13b2a95
SHA13ab6dd7d1c13348a8be2b7276a64bbe1c060e3a4
SHA256b800592465e11f95eca4ee4b18bc373d28ee3c276ba8664bc9e377a834126fbf
SHA512af36e5b78c1e705841af840d79dd56fa93cd1471667d082efc33bb6ab8cabc01e66615389519a2c92bddac9aa2b061768fa1aa0cdeceef0127025aef349d431e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581aa17a19a934e32a191832eac90a071
SHA18011c727aa6d93bac55d54805390c5c14189386a
SHA256ce330c0a149711eeaed183a76ac55e7aa0c82b65b902d34b905b9adbb47dd99c
SHA5124a410f541426238806bfceede08621d8ad6a91e1f7806266a8cf5975b4948c7cb719f3961dfcce49e614f2128325c383b73422043845538a674646f29a66ce4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b482e1e4be0d9317684da1da8a51d23c
SHA1a1e1ee8c0ce37a18edc58723fbabc0e8f467e316
SHA25604e466aaf21104689f36d2ca5b1d9c77654771a29ab599e1b2522d72f30d5354
SHA5121e42f86674b3efcb1ebea620ce78cf22b058d5cbdbfd60b601dc01e3d6d324f7f630e0ae8237a8c772890de7b764ced1532790377d5652b6505b301a886b7c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b028e0109c7805620b208dbd46b530ed
SHA11adbc6519d05e0d63d8f4526bb8ffafdf8ac1374
SHA2566bb175b4c19937fb6f58d8cf291351b0a4451ecb56b40e8ebbec7973f6590466
SHA51214555ddd22c269f83fb327fcc5b98009d8c66073779940cbf56e7c56de6d1c65ce752a80d26a3fd5c02e695ae2697960aa320b0cdd406c5b08d508113f7e9f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb58a260a2865765f13f6beff08fc1ba
SHA1549e278712abb2ff49a0da9732c7851b1040e609
SHA25621742ca4f5e6419aa5e4383023a64dac56e6e0753e959e00c0aed8853e106bb8
SHA512cb3b6ea77a965de7972ea3b88cfebe10762749fffc38f7a96b5ac9e387bec0e4ea46b84fe24de4ba7a8a3e0905ce047bd466b94ddda32bf89d57b47452dc5ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb43623ed4a5af36c3a9bccc4199292
SHA1f9fb87ef98ff94354879ae768837da0a511dca56
SHA2568a4760e157244421cc7405927cbe4233ec60638468eaab47118df5d2fd88f1a1
SHA512445b4f5bc63af6a6aec1bfbdb161c30b838c9b5a2cd94e0e3982d10b669f15549100bfa8c374fb1528530c52abc2941b564d76f813ac45d4d3aa2c446dbd6382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c11666da5bd44fac65debff27a1080
SHA10d4bac54961e58608bd5c85ab588592a487fdca5
SHA2569c517e4807aaf27a6ac1a28eaebe813b6742354624794d40f54201f1e508f083
SHA51228483ca0e6d8d3bbd4d0faf1ec6af43e4953d95aa3eef0d3220b41ba080cf68b392e6c766448f27874e6ec25c31a84b3eb89c76114f95e1dd9a816f2f5b38099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e92e1d4847a7cacb81aa0dd550598a96
SHA198f2f2ae5b9d2966608b343b8a9622fb8de18701
SHA256af3ab53ae9e6b8cf7e4f7488985f6afc00d0ceab96373e3a43c3e2b0876fe16b
SHA51263323df180b554cb2f3713c597bfb5f24fc0296e42f7c4b66f5454f799aff9776540f0b2a337657abdcf50513fff7031771739cb4091d206a6677deda6e28ee8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b