Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
e2eef3154ac480626174c41dc166a2db
-
SHA1
bed638a383758fb823c8b8942e7b4b16969fc2d5
-
SHA256
aa6703271ba6164a0b1924968b3a09015165e1dad5c44980ad9fd65b507e8d8c
-
SHA512
977c742809d5a5515307f76b3963d6a0db0a8adc8544ac449dd1027100ba1a233dabd8e8884d86dc515843f511bb712074d517c86497f227d13ff234e2075bf2
-
SSDEEP
12288:TYujabNuQcJFAs72RV8P2GR5fjfT5yZ6xpT6pfTcV39FFFfW:TY283kxR5DT586xF6fTcV39FFFfW
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2692-1-0x0000000000400000-0x00000000005B3000-memory.dmp modiloader_stage2 behavioral1/memory/2692-5-0x0000000000400000-0x00000000005B3000-memory.dmp modiloader_stage2 -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2692 e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 2804 2692 e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B40F1E1-B87C-11EF-A96C-C6DA928D33CD} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440164893" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2804 2692 e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2804 2692 e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2804 2692 e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2804 2692 e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2804 2692 e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe 31 PID 2804 wrote to memory of 2800 2804 IEXPLORE.EXE 32 PID 2804 wrote to memory of 2800 2804 IEXPLORE.EXE 32 PID 2804 wrote to memory of 2800 2804 IEXPLORE.EXE 32 PID 2804 wrote to memory of 2800 2804 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7dfc57eaf6ed42211316ef17a1f577
SHA185a85ca5b7bfe5e13a186cdd3c257106eb280a91
SHA256679053213311372f5c9de49b6c36061776f43e770946b1f9cf9acf03b71b6355
SHA5129b0ff2a4f5b7d57127233d05b1a642524e10b1753e173b4aa2e5f0e08d381db914df90867b7ac1415af56d4dc8b359e9036e701672c795c40cb2ae5715364c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511bbdeb92dae786b866e938c9c63e423
SHA1b68930c18c3f23a35b58a0284476d13f4d9bec51
SHA2568c9355e287a5f3c04b3b2901ba72f8625c04fb351fda54dd372b53ae33eb04d8
SHA512ce8a60c772b4f5682cb9356eec3efa34f7eb3b7f7d3ffebfd587cfb6a5ce9302fbcb454872772e2c4e6733760e6566183544da98f62097bf57340581eda50c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ce3f36e8539a199dc06841447e3076
SHA1cd44762c4ac3128760710c4aa3b0a91785fd1227
SHA2564ad5308c7a8d27976d3012fc6a1cfd3d99fa8be0c5746ce71a0623852073970a
SHA512593c46eaa4b2905679777a75e771e2281e6cc6520afeeb1828781ead6e3016cc6115a6af2790116113a38f328923167209d28dfb06efd27001fcede9c39e6c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7dfed7933e3341b59b2ec21a98c9acd
SHA172c102d94cf2e4532e87fdff75d9b709d02bd66d
SHA2564666a53d70a624f6a456932d9cb4a003da6e111625a116a0929efe19ca98947c
SHA51209fa6b2b350a2de93a9febf5968efa8ce1e20c473b5089dd2fba23d7725ec15954589fdf368916781bd5295b3746b1fa6b95acef179a2380166e04a5b22f9d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf02a498676b5760f945993e901b0f1
SHA1d646937ead173b733a612cc8dc6f25a81fc539b9
SHA256181b52ebcbdef8a51d7613c9861eb40fe055f7ba84623123df0eb9cde6cb51f9
SHA5128039dca1a1ff947d82cd3de2117d7e04502087ae01fdcebf7f28f64041c12a3465ab6412374b3e4245559d3dd2cd8d768b1373360d747d9d2f891905e2435b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040bd4510440a1ea485e69a1499dba1b
SHA158d966a7739bd6d7c3bfe108e8c12c8b67597cee
SHA2566131ff2e2b8a02076b19d6f682159478787ecd2956551c03ebc6da4a4d50c897
SHA512b65c94d44ba954ef152699dbc04c007c6903e5944d3354156f7c48e0eefed991611b6829dd85301cb8be7bbc55b64872004f2bd5b367ab1ff06adb01081a7927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1efad2b30b42a680888204e3959f7ac
SHA1d6c4281dc75aa5c5f25e4d039c43e2ff1523f8c1
SHA256ab0ffce3fe48a36a48b90ae3cbed6e9910eed5e59050567f16fc00469535c41c
SHA5122f735eae335fd0f21f4cf48cadbe6c31b998d3d20c4f273d858438b998046f2d6607cf31d7140e09911e069b18030472d5adbe184469ff3516fa282413e4c37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53599d454b7dcf2a7396d6fcd7b19eb85
SHA15a0c84e4af8dd2a85fb36fd0467e0086a15857ae
SHA25630495dabb9eae6bc30b6a28a6d7512139adb02595effe32bd967f5392c0eceb6
SHA512ad124b00a0d9a827224e07ee21bbb9f91ecce04f9e103c55989bb3db4bb96d03ad54ee122b7ef6f249dd878a3a0725b78713a8402a8504f2a2c3afb94d910eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558e32c426936688b4e85fc124a5ed01
SHA1086c4a9612355e7f062042d177076316dd4f552b
SHA256bb93e0b1bd07409e4431a9faaafcdffaaec4018c972719cf19ba7b5350a608c3
SHA512e77ab38b9c59d57555e692719b6b569e6cc36c39ac41bc1d25f406c34767842d9bf0598b61eabeb8d8aed5b7b40ba601afb54a0b109bae29418347746a535548
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a6f85053f0c6783f3ac75981e32233
SHA1fa05bb77be2e27a786c60354cf381793ef32c9ac
SHA256a44bfd83db5806e52619855abee713c96f3b039d8eca032dd4c47cf898f9c4ba
SHA51215491063807399ce5cf8297adfdf023a112f9f5137201fa73a2ba9786bb80030fb811337edd666e4bf44efcfe9acf85f242ad12c266b1391963355acda4c1173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bab14b27f2525213ca4e937062b63f
SHA138551817f8531360c9325ba96b1bb49b158ac360
SHA256be53b99884abe52d80ba5b045e2a9cb68d9d9271f213f081b735e820254219c6
SHA512f7b391394f131bb7f4351aa92b5696fc0e68f893cd8a11a063c9061baf4b96578ce71617e612ea8e9b439c74065e33f2b2cafcff8e9265417c07ca3660a45c8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d2e6a419903f7b79ba7cc48a738901
SHA1b6427a563c3896dc93c0bd925812ea79ca075300
SHA256366175c136c4d2fe330c5744a294b89308dc53e73a50beaa6497e8c47052aa99
SHA512ba7741091f1e143103dae70bed3f3ea17e468b4823406bf9060676d8dbf00bdd1f64676a0e34fe860bd64132a9badc45424fcf9c85814578cf2fe8ba94e29501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3d2939a9aff169c57cacc59561d11a4
SHA131b169434896597417aac3847d3c86c8d884f082
SHA2567aa69b3dcd86794958a07e24efc724da35555dfc1f1798dd25451d38cbffefe7
SHA5124f8697ab65177ca3510f187fa4ee46b081fffd6bc552fcba5e2c221b99fc0159e715a3955aec0460c93e345bce62c8b181f13452c84ce41a492a13b15443f375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5eb98a00ade1e68bc2a6a58755aa20
SHA114afe82e4f31f3682eed265b8e72134fcb466019
SHA2563a10fa88a0d47b690e8381adc2d71887e58bea8b226bcf306f4ef1e62be0a5f9
SHA512a7d29eecaa1139eb2e04e216964a347addc42565da1489d364cd4047d90991b3a951accac2bc37d4837a825b79a1cbd20c808263ec8243bd83bafc3d39904743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c11881b3e65bf4932ca827334e7ee4
SHA13c515ce66bc4034be1969a97084c1ba44a35c9e3
SHA2563cc32175ede3b366016e1c6d6c9f3c81dc9cff9ca17bd4e4314d4d754048849e
SHA512706f07de00fe6267efdad833b83df1c239c561cbd5dbfafe824e729ef3b1c82712735901dfd17937abb1fe65babd78c0c652b1103c27c4ac1a6502bf62ed344c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e165feaf5ed6aa8497acfba3afc3ca
SHA173d006213f9266f171f67412aa408f3b1eb473c9
SHA2565c6b89d11d30f5f0dec1e0422ad086e612c644420f9a7edf158209d269213f45
SHA5123fa9b2de6babbe61f9da5cc5adc47bcf54e1f7253102fc92ac98b0ecfd8a4b51ce772cd02e7f393792e9d582892d92b436a3fdc902bdb5434a1d3dad3d6f6f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adcfb80191f2edb8ef3975012dbad369
SHA14edad1177ed76ad11fdd5ecf65ba53ebcc748a19
SHA25625b631945b28636316c543d231981040927bb7b5c3ab681022c895a44ba3d31f
SHA512c546becb716482ab976aa42f480a83d33ff2bfee2b8e263adf509573db8ecf9f2ee7e01f5d804a7040ce8f26e10c634024d24437d35b1b42e9f0bf04bcb6ec3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9eb67853bcd000c152788bf62621b46
SHA126a2d488f5b13fec302cd0cbd3ba39798bd0f6db
SHA256408619049972bc7ba50a1d27c3465c5d1406b1d7d1814810b5af952f3a590952
SHA512fc24cfebdec5a185aa219fe243c8a282d0b17b21aef702a6f5c7fc54d24c65568fc32d3188e7555d0d3e38aa90ed2f652fe82a5850fb8ee8879dc02b10590da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda79cbfddb3ab5d2bf54c7ada70f085
SHA1d6797cf7f2058df51d8399c2b414b9a91785cd34
SHA2560105ff0d14d3ddeb0fbeb97b75d61dfdc14438c0ecd7a6231627523d8f4a4db2
SHA5121501cb72e86abf62017948489c2851e4a319cf8c8ebab215bc6857e0bfa840f14f72fc0b188647865d4f585f1665b0da92daab7cec02b96f545f90b518542822
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b