Analysis

  • max time kernel
    119s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 19:33

General

  • Target

    e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe

  • Size

    730KB

  • MD5

    e2e888f574a744c715f3715a2a1aad5e

  • SHA1

    e6500e23a4ef1080617d3e77d3bebb7ff9b81142

  • SHA256

    aad420ae73ff2d40ec364688fbf67edbee7fe5c32aac66adf811bb551d5697b1

  • SHA512

    d709dbd840814fcd154c8087c4157cb3c95623c10c61595bdaa129fdbf57185d8962fc23c4b271c1722271c4baba2752e07685d38c42c60149d72411c22a1edc

  • SSDEEP

    12288:Wc//////jr00msiGLOV4gf0PegUbPcRLw26m0P5xYSNtcLsV+yh1b:Wc//////jrVKb/fwegUbczQ/YSNtcLhG

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e2e888f574a744c715f3715a2a1aad5e_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1ed4b55120ff973d8ff29e1c80a61de

    SHA1

    52a65720192ddeaed2d7b46bb62d620a9e8ac72c

    SHA256

    08c310a9aa2351f522c4e710970cc2f14a983e9c12ce2bc69ac55bb2c558a245

    SHA512

    e246e17dace6a0e58d579a015536dd9655681bf9c84e6e39d766a1f4d1cfa3125a6fc6291720a489c024a339b17a7dd34a11f20b825cbd8761d719662e0a2570

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4690ed34aaa4bb0520ab7517750a1a5c

    SHA1

    1cf051cca6f87c48a7e5702616613167d9e0371c

    SHA256

    9aace362dc01b8633f72961dad1f446d0de06a2f32c56023f7e0eacaf993aac9

    SHA512

    43b681dd615779fe198320fd06c039a4eb781aeec2ba4a0144daa4447f831293ab7bd2248b27653941789ec3cec7230de6cdfbd0089773dfc493ac25c806c694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d414f96d9a1d8eac6da44a4bc00f0a0e

    SHA1

    3d014c6f5f1ae60b3c28fdaee384d8d345b08949

    SHA256

    2c0466677d4b76f31898164d05d8c37f3fdff7c8956b6304506c7898d4d777f3

    SHA512

    6a0b69dc446ddd11331ccd4d0bffd7a9560ba71daf41b2b5fbdd06e47fe614de3bb9a9a4d1333d7286459d2b7b2f991bcd4fe45ca1f88e4f78fb4579b61cd2cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ad8db81594aec2dffdaa45c9e04da39

    SHA1

    dfe63928a68dae78125d8751943e4fa314531859

    SHA256

    92cd5854e7d8ab95bb78ea9a0cf7a6ee11deb37ec90dcbcdecb64aba5768fe85

    SHA512

    8c3bffafdc7a73275f09ce575cb60a48256d5cffbff252270bd99001ea611fa65dd80dbc0e4a364375b6b0f1a05ec260f6b33da556223c0a596eadbc39723734

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3c1fb9bf7f4fbb279222334a679aac6

    SHA1

    dcf65510ed94b2d665e49e5a22be410912622745

    SHA256

    c056c43f63390be9163c88a06ccad8da1d81ba850057f72a24201733946cef6f

    SHA512

    9df07b3665db133ad609e509c3642e7152767d11d0f9254f53143d16f4ec7c58d56754f4e7e3fbbb6b0b54d54eb82b58fb824c0fc8181e3539b11b644303ccc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8312078402c95e32489f88ec10d0581

    SHA1

    44eb0787ca6ef8a282888b2676deaa24c477f378

    SHA256

    fe4000e68c8ef6d11334fbe3880aa96ee2f796afa1639dbb60fb9fbd8bd18440

    SHA512

    e54416649390a96a495c29d06d3921acddad87b667e03410a22c16777ef908d898bfa1c0ca03cebf10479517e213d6b1d8936cd509b3e2c2f73eccc06ec8651f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0fb69284f4bfc6627631c1c0e2360ab

    SHA1

    a0001b4608defdce784bc90d155da08a9e266957

    SHA256

    fbe352b2b859e11422fca4e766b0b487143b53222f05b7bab0c2257965f2a6e3

    SHA512

    e2bfbe0c6dfae612489fcf8aed5162be5a9724b3eb8e298feb14c08b23b9d8833cede09993f5edc1da30efa2cd68a618981529ecb2d834a3f7967dfdd62c3ca1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7154bb07db126d8a59d8d8c2a13b2a95

    SHA1

    3ab6dd7d1c13348a8be2b7276a64bbe1c060e3a4

    SHA256

    b800592465e11f95eca4ee4b18bc373d28ee3c276ba8664bc9e377a834126fbf

    SHA512

    af36e5b78c1e705841af840d79dd56fa93cd1471667d082efc33bb6ab8cabc01e66615389519a2c92bddac9aa2b061768fa1aa0cdeceef0127025aef349d431e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81aa17a19a934e32a191832eac90a071

    SHA1

    8011c727aa6d93bac55d54805390c5c14189386a

    SHA256

    ce330c0a149711eeaed183a76ac55e7aa0c82b65b902d34b905b9adbb47dd99c

    SHA512

    4a410f541426238806bfceede08621d8ad6a91e1f7806266a8cf5975b4948c7cb719f3961dfcce49e614f2128325c383b73422043845538a674646f29a66ce4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b482e1e4be0d9317684da1da8a51d23c

    SHA1

    a1e1ee8c0ce37a18edc58723fbabc0e8f467e316

    SHA256

    04e466aaf21104689f36d2ca5b1d9c77654771a29ab599e1b2522d72f30d5354

    SHA512

    1e42f86674b3efcb1ebea620ce78cf22b058d5cbdbfd60b601dc01e3d6d324f7f630e0ae8237a8c772890de7b764ced1532790377d5652b6505b301a886b7c55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b028e0109c7805620b208dbd46b530ed

    SHA1

    1adbc6519d05e0d63d8f4526bb8ffafdf8ac1374

    SHA256

    6bb175b4c19937fb6f58d8cf291351b0a4451ecb56b40e8ebbec7973f6590466

    SHA512

    14555ddd22c269f83fb327fcc5b98009d8c66073779940cbf56e7c56de6d1c65ce752a80d26a3fd5c02e695ae2697960aa320b0cdd406c5b08d508113f7e9f5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb58a260a2865765f13f6beff08fc1ba

    SHA1

    549e278712abb2ff49a0da9732c7851b1040e609

    SHA256

    21742ca4f5e6419aa5e4383023a64dac56e6e0753e959e00c0aed8853e106bb8

    SHA512

    cb3b6ea77a965de7972ea3b88cfebe10762749fffc38f7a96b5ac9e387bec0e4ea46b84fe24de4ba7a8a3e0905ce047bd466b94ddda32bf89d57b47452dc5ff6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bcb43623ed4a5af36c3a9bccc4199292

    SHA1

    f9fb87ef98ff94354879ae768837da0a511dca56

    SHA256

    8a4760e157244421cc7405927cbe4233ec60638468eaab47118df5d2fd88f1a1

    SHA512

    445b4f5bc63af6a6aec1bfbdb161c30b838c9b5a2cd94e0e3982d10b669f15549100bfa8c374fb1528530c52abc2941b564d76f813ac45d4d3aa2c446dbd6382

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65c11666da5bd44fac65debff27a1080

    SHA1

    0d4bac54961e58608bd5c85ab588592a487fdca5

    SHA256

    9c517e4807aaf27a6ac1a28eaebe813b6742354624794d40f54201f1e508f083

    SHA512

    28483ca0e6d8d3bbd4d0faf1ec6af43e4953d95aa3eef0d3220b41ba080cf68b392e6c766448f27874e6ec25c31a84b3eb89c76114f95e1dd9a816f2f5b38099

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e92e1d4847a7cacb81aa0dd550598a96

    SHA1

    98f2f2ae5b9d2966608b343b8a9622fb8de18701

    SHA256

    af3ab53ae9e6b8cf7e4f7488985f6afc00d0ceab96373e3a43c3e2b0876fe16b

    SHA512

    63323df180b554cb2f3713c597bfb5f24fc0296e42f7c4b66f5454f799aff9776540f0b2a337657abdcf50513fff7031771739cb4091d206a6677deda6e28ee8

  • C:\Users\Admin\AppData\Local\Temp\CabCB7A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCBED.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1992-5-0x0000000000400000-0x00000000004BB000-memory.dmp

    Filesize

    748KB

  • memory/2056-4-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-15-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-9-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-444-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-8-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2056-6-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-7-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-11-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2056-3-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2220-12-0x0000000000160000-0x000000000021B000-memory.dmp

    Filesize

    748KB