Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 19:42

General

  • Target

    e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    e2eef3154ac480626174c41dc166a2db

  • SHA1

    bed638a383758fb823c8b8942e7b4b16969fc2d5

  • SHA256

    aa6703271ba6164a0b1924968b3a09015165e1dad5c44980ad9fd65b507e8d8c

  • SHA512

    977c742809d5a5515307f76b3963d6a0db0a8adc8544ac449dd1027100ba1a233dabd8e8884d86dc515843f511bb712074d517c86497f227d13ff234e2075bf2

  • SSDEEP

    12288:TYujabNuQcJFAs72RV8P2GR5fjfT5yZ6xpT6pfTcV39FFFfW:TY283kxR5DT586xF6fTcV39FFFfW

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2eef3154ac480626174c41dc166a2db_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb7dfc57eaf6ed42211316ef17a1f577

    SHA1

    85a85ca5b7bfe5e13a186cdd3c257106eb280a91

    SHA256

    679053213311372f5c9de49b6c36061776f43e770946b1f9cf9acf03b71b6355

    SHA512

    9b0ff2a4f5b7d57127233d05b1a642524e10b1753e173b4aa2e5f0e08d381db914df90867b7ac1415af56d4dc8b359e9036e701672c795c40cb2ae5715364c8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11bbdeb92dae786b866e938c9c63e423

    SHA1

    b68930c18c3f23a35b58a0284476d13f4d9bec51

    SHA256

    8c9355e287a5f3c04b3b2901ba72f8625c04fb351fda54dd372b53ae33eb04d8

    SHA512

    ce8a60c772b4f5682cb9356eec3efa34f7eb3b7f7d3ffebfd587cfb6a5ce9302fbcb454872772e2c4e6733760e6566183544da98f62097bf57340581eda50c57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1ce3f36e8539a199dc06841447e3076

    SHA1

    cd44762c4ac3128760710c4aa3b0a91785fd1227

    SHA256

    4ad5308c7a8d27976d3012fc6a1cfd3d99fa8be0c5746ce71a0623852073970a

    SHA512

    593c46eaa4b2905679777a75e771e2281e6cc6520afeeb1828781ead6e3016cc6115a6af2790116113a38f328923167209d28dfb06efd27001fcede9c39e6c77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7dfed7933e3341b59b2ec21a98c9acd

    SHA1

    72c102d94cf2e4532e87fdff75d9b709d02bd66d

    SHA256

    4666a53d70a624f6a456932d9cb4a003da6e111625a116a0929efe19ca98947c

    SHA512

    09fa6b2b350a2de93a9febf5968efa8ce1e20c473b5089dd2fba23d7725ec15954589fdf368916781bd5295b3746b1fa6b95acef179a2380166e04a5b22f9d8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bf02a498676b5760f945993e901b0f1

    SHA1

    d646937ead173b733a612cc8dc6f25a81fc539b9

    SHA256

    181b52ebcbdef8a51d7613c9861eb40fe055f7ba84623123df0eb9cde6cb51f9

    SHA512

    8039dca1a1ff947d82cd3de2117d7e04502087ae01fdcebf7f28f64041c12a3465ab6412374b3e4245559d3dd2cd8d768b1373360d747d9d2f891905e2435b80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    040bd4510440a1ea485e69a1499dba1b

    SHA1

    58d966a7739bd6d7c3bfe108e8c12c8b67597cee

    SHA256

    6131ff2e2b8a02076b19d6f682159478787ecd2956551c03ebc6da4a4d50c897

    SHA512

    b65c94d44ba954ef152699dbc04c007c6903e5944d3354156f7c48e0eefed991611b6829dd85301cb8be7bbc55b64872004f2bd5b367ab1ff06adb01081a7927

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1efad2b30b42a680888204e3959f7ac

    SHA1

    d6c4281dc75aa5c5f25e4d039c43e2ff1523f8c1

    SHA256

    ab0ffce3fe48a36a48b90ae3cbed6e9910eed5e59050567f16fc00469535c41c

    SHA512

    2f735eae335fd0f21f4cf48cadbe6c31b998d3d20c4f273d858438b998046f2d6607cf31d7140e09911e069b18030472d5adbe184469ff3516fa282413e4c37f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3599d454b7dcf2a7396d6fcd7b19eb85

    SHA1

    5a0c84e4af8dd2a85fb36fd0467e0086a15857ae

    SHA256

    30495dabb9eae6bc30b6a28a6d7512139adb02595effe32bd967f5392c0eceb6

    SHA512

    ad124b00a0d9a827224e07ee21bbb9f91ecce04f9e103c55989bb3db4bb96d03ad54ee122b7ef6f249dd878a3a0725b78713a8402a8504f2a2c3afb94d910eca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    558e32c426936688b4e85fc124a5ed01

    SHA1

    086c4a9612355e7f062042d177076316dd4f552b

    SHA256

    bb93e0b1bd07409e4431a9faaafcdffaaec4018c972719cf19ba7b5350a608c3

    SHA512

    e77ab38b9c59d57555e692719b6b569e6cc36c39ac41bc1d25f406c34767842d9bf0598b61eabeb8d8aed5b7b40ba601afb54a0b109bae29418347746a535548

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1a6f85053f0c6783f3ac75981e32233

    SHA1

    fa05bb77be2e27a786c60354cf381793ef32c9ac

    SHA256

    a44bfd83db5806e52619855abee713c96f3b039d8eca032dd4c47cf898f9c4ba

    SHA512

    15491063807399ce5cf8297adfdf023a112f9f5137201fa73a2ba9786bb80030fb811337edd666e4bf44efcfe9acf85f242ad12c266b1391963355acda4c1173

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5bab14b27f2525213ca4e937062b63f

    SHA1

    38551817f8531360c9325ba96b1bb49b158ac360

    SHA256

    be53b99884abe52d80ba5b045e2a9cb68d9d9271f213f081b735e820254219c6

    SHA512

    f7b391394f131bb7f4351aa92b5696fc0e68f893cd8a11a063c9061baf4b96578ce71617e612ea8e9b439c74065e33f2b2cafcff8e9265417c07ca3660a45c8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81d2e6a419903f7b79ba7cc48a738901

    SHA1

    b6427a563c3896dc93c0bd925812ea79ca075300

    SHA256

    366175c136c4d2fe330c5744a294b89308dc53e73a50beaa6497e8c47052aa99

    SHA512

    ba7741091f1e143103dae70bed3f3ea17e468b4823406bf9060676d8dbf00bdd1f64676a0e34fe860bd64132a9badc45424fcf9c85814578cf2fe8ba94e29501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3d2939a9aff169c57cacc59561d11a4

    SHA1

    31b169434896597417aac3847d3c86c8d884f082

    SHA256

    7aa69b3dcd86794958a07e24efc724da35555dfc1f1798dd25451d38cbffefe7

    SHA512

    4f8697ab65177ca3510f187fa4ee46b081fffd6bc552fcba5e2c221b99fc0159e715a3955aec0460c93e345bce62c8b181f13452c84ce41a492a13b15443f375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f5eb98a00ade1e68bc2a6a58755aa20

    SHA1

    14afe82e4f31f3682eed265b8e72134fcb466019

    SHA256

    3a10fa88a0d47b690e8381adc2d71887e58bea8b226bcf306f4ef1e62be0a5f9

    SHA512

    a7d29eecaa1139eb2e04e216964a347addc42565da1489d364cd4047d90991b3a951accac2bc37d4837a825b79a1cbd20c808263ec8243bd83bafc3d39904743

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13c11881b3e65bf4932ca827334e7ee4

    SHA1

    3c515ce66bc4034be1969a97084c1ba44a35c9e3

    SHA256

    3cc32175ede3b366016e1c6d6c9f3c81dc9cff9ca17bd4e4314d4d754048849e

    SHA512

    706f07de00fe6267efdad833b83df1c239c561cbd5dbfafe824e729ef3b1c82712735901dfd17937abb1fe65babd78c0c652b1103c27c4ac1a6502bf62ed344c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00e165feaf5ed6aa8497acfba3afc3ca

    SHA1

    73d006213f9266f171f67412aa408f3b1eb473c9

    SHA256

    5c6b89d11d30f5f0dec1e0422ad086e612c644420f9a7edf158209d269213f45

    SHA512

    3fa9b2de6babbe61f9da5cc5adc47bcf54e1f7253102fc92ac98b0ecfd8a4b51ce772cd02e7f393792e9d582892d92b436a3fdc902bdb5434a1d3dad3d6f6f27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    adcfb80191f2edb8ef3975012dbad369

    SHA1

    4edad1177ed76ad11fdd5ecf65ba53ebcc748a19

    SHA256

    25b631945b28636316c543d231981040927bb7b5c3ab681022c895a44ba3d31f

    SHA512

    c546becb716482ab976aa42f480a83d33ff2bfee2b8e263adf509573db8ecf9f2ee7e01f5d804a7040ce8f26e10c634024d24437d35b1b42e9f0bf04bcb6ec3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9eb67853bcd000c152788bf62621b46

    SHA1

    26a2d488f5b13fec302cd0cbd3ba39798bd0f6db

    SHA256

    408619049972bc7ba50a1d27c3465c5d1406b1d7d1814810b5af952f3a590952

    SHA512

    fc24cfebdec5a185aa219fe243c8a282d0b17b21aef702a6f5c7fc54d24c65568fc32d3188e7555d0d3e38aa90ed2f652fe82a5850fb8ee8879dc02b10590da4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bda79cbfddb3ab5d2bf54c7ada70f085

    SHA1

    d6797cf7f2058df51d8399c2b414b9a91785cd34

    SHA256

    0105ff0d14d3ddeb0fbeb97b75d61dfdc14438c0ecd7a6231627523d8f4a4db2

    SHA512

    1501cb72e86abf62017948489c2851e4a319cf8c8ebab215bc6857e0bfa840f14f72fc0b188647865d4f585f1665b0da92daab7cec02b96f545f90b518542822

  • C:\Users\Admin\AppData\Local\Temp\Cab33.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2692-5-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/2692-0-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/2692-1-0x0000000000400000-0x00000000005B3000-memory.dmp

    Filesize

    1.7MB

  • memory/2692-3-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2804-4-0x0000000000290000-0x0000000000443000-memory.dmp

    Filesize

    1.7MB