Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 18:55

General

  • Target

    e7cc5c9d6faf028957d32a5fdc00e1c0_JaffaCakes118.exe

  • Size

    682KB

  • MD5

    e7cc5c9d6faf028957d32a5fdc00e1c0

  • SHA1

    a5bb642ced99720eb4b21564e653eb04ef75e148

  • SHA256

    e396a252bc70d716daf18f0614241b6b13f675c73bd759c2e894de96053810e4

  • SHA512

    90b20ad450500b8972b0f5250ac6a49e2cab1fcbe5c464a7d40d49eded41e588213f59bbee743a41bb39cbb856fcd2df13690fdb3ee7443b042a0d03a3a2eb80

  • SSDEEP

    12288:W7ffbO6b0pL6Km6j48DN1Ne77YF3Z4mxxNBO4Vbd1zfi3tUEk6KP8:WDfqc0p2KzDAAQmX75VTG9U16KP8

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7cc5c9d6faf028957d32a5fdc00e1c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e7cc5c9d6faf028957d32a5fdc00e1c0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41879f070f4882fa89d2cb18897d4e66

    SHA1

    2fa13467404f6d3cf4fd2180fb7461eaa1649d0f

    SHA256

    a6827c6c10e9aff6741be541b6214d25dd2722f1e7237993690e14c8a63685b2

    SHA512

    64245515c2839a7c139fb2609a522b140a1839f3c5f6f895dcf375fbc10b9974428ebde98585093a87b0092234d4899d3bd88fd7f06ba8af73f9b6023688f379

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b30f19d259af7fdfa50895cc9f944f8

    SHA1

    8385cb99791ad8e8e4159435e7cb08f09cb8bcf9

    SHA256

    f44459a72bd1d46e2124aa289224a1c9f0b209091ddd27c34347a401992aecdf

    SHA512

    ce97b02dd595d4d0ba6f823ed0ec7412107f277c22686ccd18188d0685bb02cf32dae50963f27304e3b114a18634ce83f837170e7014f6744ec4c57750547506

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f46a08ee56afbeefe921a1b06fca82d

    SHA1

    fb0a2de7cb269bd58d24e328a56f8725be91395b

    SHA256

    d13a41d5935f0dd3b6f8b237d3b143ef0d4d5377f30fc09e1b8126a356733600

    SHA512

    955acd612857eb5b1382adf4839fab3ad85d2a59863c97d2e792b487f8306f8f72011752165b58a64d1e9a2408572d7f449f754a147ffee1c7a024086ce7901a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    679c342a5d2c1b59f2826e39e9a5b8d0

    SHA1

    f9606eab9dfcf0d3114686dee2142453bb49fc78

    SHA256

    276494fa65fd94ad19194d9ebba47492ff1f1efc9972294e940bee14aba2c0f9

    SHA512

    c29bef31ceac3f7a22dcb37d6b42680281124bc62a006ffa7db7d8474aafd9f8b3f0b96c0575b8d03bc9d084cbc11c334840942826f42d73deb9a9293ebd2ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d248117e265ce14534ab751868b28a63

    SHA1

    965e0dbd57d911830868ece06674e714b4cf970c

    SHA256

    b114b85db75d35f7011f211daff17f718865d1951156c92facbb6b1172201232

    SHA512

    638cb635a7e5dc30ebdc520b4d9c4ea81c13ab8991b5cd04929ea15bd35934ccf56b1cf306fef939c45ef7d1a914a8b594b295942c73a8be8a6b5aa58e622935

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bf027d5cf1e3ddb57a72ed1fbb0d6e2

    SHA1

    f58504776fa7c9ffb1d3970e0ab1bad2db584cf1

    SHA256

    db823802fed6cd7be580ad49794b8a3a5375cc8e110476be3b717ec2055a74e3

    SHA512

    33e86c2e4f78b58d2319846313df82e999a45c7739c396792ce2b5687675187baf831a7e440c5a9627db5f902a094844913f26d4a5a1a4413627c88d04fbeba8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    883d51be213e0e2a8ab4d5cf9b6d7c80

    SHA1

    25991fac5b6566380e7ee9ed8fa9daaab5149431

    SHA256

    33ebaa1996e7e050a6294b4cab78f2981739e44284adb9e3fed6e17e74f129a3

    SHA512

    2fac96d1459561430db002103e644330289612a706a23ae97ab4133b61f2a75d07ef9029ebd2180ee8b77e6c8a0da2e45a5f7dccf96934fd9ce0d59fd817c491

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7c515b882f4453a269caa2fbe2ccf81

    SHA1

    cf6b4b4b06075e45158f00f239f33c424036fbb0

    SHA256

    ee3d77b5935e02928d21abddf87cbe01b8ea76486e9fbbdc710648ab91bd00f1

    SHA512

    3d5ade5a99a732ff2bb9f6826fb9ac8d683c1bf1a9162f3ece66fa39e1b3a32b4246db941ffa754bee8bc7a9eff036a9d2ad1504b68a9851ba3e707e09aadf94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21e910f466c919d8db2d160add060644

    SHA1

    e79bc2bdd29bfacca05bfc9ed2fc2d217bd89750

    SHA256

    71e308a4476a835e91c5c4a0e9f69a5d43c211dc03648c164f3601dc3915f38b

    SHA512

    48d9bc7883f15256bdedcd28c8d48eb02afefedaf32c37d09fece2749f40163b378bf914aac2f9d32e5518f98ce5055a00d4f213c43c5766137c62f11da693df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79dd01bfa5dd287d06ffbb314bb4d450

    SHA1

    2748201630a4fcaf5da1fe11d42db4f70441d73e

    SHA256

    85f4bf937dc37f5ae03e6088cbfaeb4cf4cc5d3d2084afa675f069391b8404d6

    SHA512

    1a4c02ea18df2a28a31be1caa5cedf8aa3c06f164cf2f708116396f265a37ac5f67217f170603244f598a2da5337a86bbf698fdbe11203cd418552e8e493a34b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5719623859217558956c4fd74762262f

    SHA1

    b0c99931febd78277147dd27fbd1da855d196921

    SHA256

    b1e7814403d3dd24dff56507f1d9cafbbd4e1a4d8b33448f63012b1ea58c39a8

    SHA512

    13f93db4d375a6e5990e553926d21e8052217d68727f53448e84cda2ecf63c82d78ef35d603aa360a83d9d4c9c54968b39d16fe0e7c17a4bbe84dd143ce5f83f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8d9646015c9ee41e2a7bfa2ae687cd6

    SHA1

    32e5fdce2d305ef85a62d171530fa120510511a7

    SHA256

    c16b41f2ddb94c160d1895abe44fb999e8c3b3494a7d418d525d2aefbedff9e9

    SHA512

    0049da71a2d95ad98d3e1e973f46574208b81ddcf524d242455dd7d24161ec27e45818217d19b50d719b216445204395c58eb6200f20f0f2346d1c50fe832123

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2404038095d187c68d5a3b7d272cc41

    SHA1

    a2bc7feacc14897bc86bd2d4c2bcabd9de4ca826

    SHA256

    a5293f5dca9c3bee80d5839e4941368dae24fad4bbb2b1c2759192c813b124d1

    SHA512

    5726de5cbdaba1f1a209f3494c7b5a1c734f18fd0822155812b91fb2f15e45b20fc567a4ab94e32b6ca11de13a3ba53a76efb6772756e4defc2f54962ef128f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46cc5fabf7923994b98644c5e481c52f

    SHA1

    d5c04710721fb83d3a74a8c17d254d21eb2be19f

    SHA256

    724dac0fcd3cc1d59d57c5255da46561b8ac85f90751dae2bdc4f0ae4b7aef71

    SHA512

    ac6a15e4c8e6229b261790577f3ac283b7c9af6845edc1650f0aa1053210261c362e98d9128d4d8af4180dffaadf58401509546b130043cdc533e7ba9692bf74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    131ec29c21137bf05d557364340fee15

    SHA1

    88b8d62286a8b7a0c371773d2ff04774e35c1b68

    SHA256

    b9a1263b7ed5d1d81924344752148081047177c55e8029fad6fbbe11f0322733

    SHA512

    05da2cee231227556194257a6385261edd7052852f5ad345e370f6c7ed58a3eb49d3dcc1654234403f58e324c68d326802d73aa6f994313fb0c516fb27bb4545

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fda6c8dc4be181fbfc2b46b0cec7c339

    SHA1

    cd6796842271915bd8cfa0c0d5ad5b9b312a3d0f

    SHA256

    2378f0bed4869e5112e12709a5aa8f25f830e622569bfaac70c73fad9e9c6fb6

    SHA512

    58ecf1ba4081e615bb81f144e90adffceb8abeb56e58aef710f745de54a97c7cdb8fbddae753bc11d07527b1083b6910186c6a976024fd00b58873b30cb8fff4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1fcee7de4ccbb55c44d47b5ec4b2ffcb

    SHA1

    fafce0b6493e16b9d5a232274453580e05014604

    SHA256

    fcf69398a25ed3ca4855e6f3d29a3c8ac3de1ce278412c80409284b7e1cf29ef

    SHA512

    d4803111101b679e8b21eb8200222ae28a02addea504bf8c60c1a721b7ef98d6d7e42f1262b01a90ff39e8b7a365e560cb27a58f70dfda379cbcc3becfdcf0b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b84b6f8d7cc98519cfcf421836a06f19

    SHA1

    1196be905fd8c5ee0ec2d00820b42272290285c0

    SHA256

    031f88edbeb21e7ed68ad57ac89ed03ab0632af104d763c21ca67cc96f4be086

    SHA512

    a3122a7063d1142c690619d30716fb8bc48ebe535cfe1308d3579cf215920adad0d2c36380d6f8baa6b902ad034b2a1a2124334a9ed9b2084769c7d04d054359

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f76d6c2fe8807034ec37d8b1d902b71

    SHA1

    36d413222ac66ddaf19af438c0f43e7c7fa34d56

    SHA256

    e70d11a091ea352af498e55184bd83a44f739aef032bfaa5afacdc7c2ec42bc1

    SHA512

    311748f39862ca21d861761eb6597bf3bb2763666a34b573645ada12e51870d5b55222e290881fd87dc12530b7e7fedb4040bc428a16f318003d69c437a9479d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1015a3999393a09b0008efa265254fd

    SHA1

    86581117afb55aba0bf23cd9e16de7ce512b68bb

    SHA256

    00112a9aeae16bd428a2e8e07dee8b4887f9567b20a32a0eb086b5fb0669ecf0

    SHA512

    87798df61a165d8402e72d92d4e833b0ca096073cde71d88be115476ba97e295bd10f325ea5831f25858bab1ec42a533aa00a27a360a9092450630f8e0c58f9b

  • C:\Users\Admin\AppData\Local\Temp\CabFFE5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar64.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe

    Filesize

    748KB

    MD5

    903c71e0d0e84486fb058345b1ff8fe6

    SHA1

    4bf13988697118db5acb24feef4b412d449f1377

    SHA256

    262a14365113f2a65ca2fa3a2974dcd387b20b31997e8a9152a8e8a08b52a03f

    SHA512

    b1f9aa444618030cf83c2f4e2d496bf51fdc3f1366ef4f398f5b1b3f5174773f2304e7f6319a1f14140d4f917bf0b76f493b19cdd522613ce261af7217c43b99

  • memory/2084-24-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB

  • memory/2084-60-0x0000000000200000-0x0000000000254000-memory.dmp

    Filesize

    336KB

  • memory/2084-17-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB

  • memory/2084-16-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-15-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-14-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-13-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-12-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-11-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-10-0x0000000000440000-0x0000000000441000-memory.dmp

    Filesize

    4KB

  • memory/2084-9-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-8-0x0000000000410000-0x0000000000411000-memory.dmp

    Filesize

    4KB

  • memory/2084-7-0x0000000000420000-0x0000000000421000-memory.dmp

    Filesize

    4KB

  • memory/2084-6-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2084-5-0x00000000001A0000-0x00000000001A1000-memory.dmp

    Filesize

    4KB

  • memory/2084-4-0x0000000000430000-0x0000000000431000-memory.dmp

    Filesize

    4KB

  • memory/2084-3-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2084-2-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/2084-44-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2084-43-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2084-42-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2084-41-0x0000000001000000-0x000000000110E000-memory.dmp

    Filesize

    1.1MB

  • memory/2084-19-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/2084-0-0x0000000001000000-0x000000000110E000-memory.dmp

    Filesize

    1.1MB

  • memory/2084-26-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2084-18-0x0000000000990000-0x0000000000991000-memory.dmp

    Filesize

    4KB

  • memory/2084-59-0x0000000001000000-0x000000000110E000-memory.dmp

    Filesize

    1.1MB

  • memory/2084-20-0x0000000000970000-0x0000000000971000-memory.dmp

    Filesize

    4KB

  • memory/2084-21-0x0000000000960000-0x0000000000961000-memory.dmp

    Filesize

    4KB

  • memory/2084-22-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

    Filesize

    4KB

  • memory/2084-23-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

    Filesize

    4KB

  • memory/2084-1-0x0000000000200000-0x0000000000254000-memory.dmp

    Filesize

    336KB

  • memory/2084-25-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/2084-27-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/2084-28-0x0000000000D50000-0x0000000000D51000-memory.dmp

    Filesize

    4KB

  • memory/2084-29-0x0000000000D30000-0x0000000000D31000-memory.dmp

    Filesize

    4KB

  • memory/2084-30-0x0000000000D20000-0x0000000000D21000-memory.dmp

    Filesize

    4KB

  • memory/2084-31-0x0000000000D90000-0x0000000000D91000-memory.dmp

    Filesize

    4KB

  • memory/2084-32-0x0000000000D80000-0x0000000000D81000-memory.dmp

    Filesize

    4KB

  • memory/2084-33-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-34-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-35-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-36-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-37-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-38-0x0000000003170000-0x0000000003171000-memory.dmp

    Filesize

    4KB

  • memory/2084-39-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2084-40-0x0000000003160000-0x0000000003161000-memory.dmp

    Filesize

    4KB

  • memory/2640-57-0x0000000000400000-0x00000000004C4000-memory.dmp

    Filesize

    784KB

  • memory/2908-56-0x0000000000170000-0x0000000000234000-memory.dmp

    Filesize

    784KB