Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2024 17:06

General

  • Target

    f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe

  • Size

    273KB

  • MD5

    f4efa8b3bc69d5df7025bd4beaf4eea1

  • SHA1

    7b6fa6886de9ae3456f27e7db3671600ee5680d9

  • SHA256

    c58fdc229e04e7a0026172635cf7f1259ed5a9f058cd9e83611a37cfe1f31d5e

  • SHA512

    257328e741817a3368a1bd980810953a28c9d0f2e9728816647a0b705698eac14ec1e6784e3430cae80369836a1348a24413edf8d4f0b22e0adf1c785e4a3adf

  • SSDEEP

    6144:EEozu3k6Y3Gmi0NybDEV8X1jpKRoR7OAdc/moPp5Y9aDC1pqffrKnK:EEuu3kZ3Gmi0NybDf1oawAymodC1pqfv

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops autorun.inf file
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\program files\internet explorer\IEXPLORE.EXE
      "C:\program files\internet explorer\IEXPLORE.EXE"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AutoRun.inf

    Filesize

    175B

    MD5

    ec717a148c0c1573ad6a89a66095c8a0

    SHA1

    2677e5c816b191a5941be928f014ec201e7de18f

    SHA256

    d9c1af73c937692718c241a501d6213fac7803ab2f8504a845a540baf047c218

    SHA512

    1a925338fbdbb79bb8e38064b092d5a2dbd47095751ac9e88490f255db050598f209aa97da0d8a9984e173059cb13019d2f187d0efc9777afc6fcf82fb763797

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a22e7383fe7b1c9b394d428516a572b

    SHA1

    5dc6766668e3ec73a87f63b79fb18e1b33e8138c

    SHA256

    8408e095518d88a48559f3b4dae92cc8f3149b0985469b9c6f8f89b6722e884f

    SHA512

    5dc5b8407656345885943f403beea37cedf2243499b27161b283a20f299426ab7b52aa3c8a975eab91ef823a60530afdbec639aa45cd498db6e8263e7cee275d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad7b359b90964f2e2e53a0a75d5df0bf

    SHA1

    b7de772c6611b0d1ac5967e785dce6197ef0c239

    SHA256

    80e4f4cdb6457596d9fb9ccf4ee573a8658922a7763fad9368665512340373cd

    SHA512

    1c5b26008b1b350456f2a02fa55c348b0b2d8719e2d51b6b951efe9751b3cc2160117c30e89dfee55426c810285850fe0a4d8a81658b5d94655085b5c5aca070

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a54d068d66981e56954f859c33627a6

    SHA1

    d9c88320d2bd61df28f7e6d25f39cb0805c682af

    SHA256

    5db7490d952f5ba445a539c60dbd4c9c8b4a74f78763046edcadb0d0cff6d235

    SHA512

    da11c96ed42c40090af1a7acfca109ae1bc5b7bfdf433226c99671819fb1462e437f0050a180a19f45ffb8c144a325472df162f75e26a42789fdc45dbb27a1b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fdd751e59e0b03b115699e6cba0614b

    SHA1

    fa331b871ffba3d4fe4aae66f37104d79502bc9d

    SHA256

    c49c02a6b46ec2bd16cc836bc708a22a2cb11479557662fe043eccb4c50b27c8

    SHA512

    e82012603cc54fbbadbccdc20da93ff275b6e4a3ab074beee668ef98ea5ed1a6620e2463fe757cb1218b6ed0b5be40394d66ffa2379a6a0326d9e11e21b1dc23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd0feb0e4c8bae7b31c481f2f906baf0

    SHA1

    112c953d123b0de7a3d70f82f2a50abdd8dc02a3

    SHA256

    d12bf7d53deebc084f1310a544f1113c6305c789fa08b65540e510b353cca0ca

    SHA512

    efc7ba848bf050f18271582ebcf39200d8a7eebfd5995a050f0f2aa84067d91160c1254a1b57f1cdb81c150071d622e89e6e78e21963f83026f84f8afefb66db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e520d4ae782dcf23bb443ebe4620bcb3

    SHA1

    36fafd8150ad6d70b1c98174ac581139b799e7b3

    SHA256

    040a41fd8669ae74bb9e548786338bb03b8c83a2824bf1934ab33df15841f232

    SHA512

    9fb5a90601976d4196e9fc4c27519c0ca503febaa7d655258fd32b6699a1b1006522548c0a6fcf31689962e485abec9e10aad52ea9e9f4579f73220fdd0cee4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83c325bcb13917410ce1edb95b1ce2bb

    SHA1

    a313536244f2dc766460d2b2952af4e83b75bc04

    SHA256

    18f6207f4e8e5403e120d2a74f22d3c4f7e565bc2ed0114d99a93225a7372712

    SHA512

    4f94c48aab0cf16b5b3e68a806158a2e72642c2668e2cf3ea91398b86b29ee87fd85f2ae9e914b998800bbbcbe18097d25d21527d07102c900bde1a4c1ff9f3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1c660e4d209cb3a5746a26560556e2e

    SHA1

    18711c75be6605d83da405bffb1eab32b53a2996

    SHA256

    ccf0fd9b709e1c5e6effa541f7a21632b87a4738ce8ed0f45ad8d0e481debb5d

    SHA512

    fffd8efe7215c6360a6a20a761b3f5e6c40385401f4df600804209415918dcbc808e6afbe787b1c4a1798f511f9a06e318fae856e6af31b2318453615e5d3dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6f8487eab1f2688e70702723bd57ce4

    SHA1

    da9d3776a1616293a48d015bb7c75c90c8cf65f7

    SHA256

    4b39b618fc258541d140a3065cd9633d7c010c8eaa1305c2d125ade81a3b4163

    SHA512

    10e1bf035332174797282288f5740019a662c96f1dc8ee6574603b055e00dea937cd87229365c126efa051283b02a3a5d2cc4bdb1186ea6169dd568405eeae78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c2543b7a347ab0b61b730387a7f4c3d

    SHA1

    fe377660f140b8be2f56055a95701acdc21d65a0

    SHA256

    410172cb753bcc9b6d5c1a8098140fb772b422b83deb579cee0f111b2f5b172c

    SHA512

    475329937059692da65e94721ba1001db0e806ea447a896064fa62d8bc8d419c745b49d55ef279e73e97a2d520e9baad8e309340c199ef037215dcb82db9da47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae2e62f5dbe1198f98f8e81b35f6cf36

    SHA1

    02e3a5f26748b09cba4959876489ceb424ae5f45

    SHA256

    44bd4e351fe78449d42e5a5cd1acf946f2bf809fdb8c8cf22b40865c27fc6c4f

    SHA512

    1b2ee6456a353ae2a6565acf1a97c12c55b1f51a774cada8a4a32f54a796f6a2967c844a944c12fa5568cf25a57ab84f55e54ba84ff32a19727f4c573036e5c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81fced950b5fc9094a1fbfa396599d9d

    SHA1

    14a6b3ee79501640ac52a73487a73d1c099086fe

    SHA256

    8bd68a97297b2e0b899cfd897a47deb486fb359f41b96428b4c5472f0aa2281b

    SHA512

    d3b41fd75681a776d313e8f82c9f65029c0a90a16a4df2cc49b3b995c85574a2f0c8c8478efc0cc59b532ac2fa52f1d4d10f259cbe391382fa3fa02ffaaf6500

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6000fd1e933fc480a0b15a6cab76a02

    SHA1

    fe26019c68a8cedf9bb7d3ac8fb62ceedcfbd3a0

    SHA256

    ed71dd01aff5f595440f0f7b964840ed85a0f842a202a3f7c715b50177a4188b

    SHA512

    c208f9910908f44c66da3a10dbe1ab0c8d4389883de5a0ef614914e2880eb8db688968707f1a876c9baab88ea697e57230878d7f1ce3f372bda091c16bf3d7dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b8fbaca4363cb6709bf8a524514b4f9

    SHA1

    003d898b316ad712ea3093c390a495d9868bb29a

    SHA256

    4c520d8bb2a185ce525f5a914b6ba4bffddfea5840fb02da517bc2f2b7aa94d5

    SHA512

    04e1e418165ba2bdbcf17f33041ff4ab0c4b4f7716254170c49946916e200fc7b9035ba78de93616582442f606382fcfc6d4cf47702179bc1a3629c93613d5d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc5be91564571a7c3594cffcabd4396c

    SHA1

    f5b648bf2e28960dfcba3e632390f55c55a4ec79

    SHA256

    ca423ac4047493603a40d165decf2ef72c6d15a1e8ddf1f7fbc6c1f992e03264

    SHA512

    221b6634ea3da3d2bc39b8d90c86d3326815177cb6946b12d25009d7c49c879bd4303f1c472fe2ef7d108470bf85f48fca7e560f66ab67eb5c24007aedd34969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36b9acdd2da45abc9d93f4116d128372

    SHA1

    48d28c1399783a04bd40149f5e9592766c1deb87

    SHA256

    f069726f96841e6b1516787e377f96d67e502c745b5a26c39cafb7934f5ac89f

    SHA512

    0b0507813af07b699ca4f79499104d485c58b8c7541abd278d163cca9e41038bfa899e584fdb93ddee4a17c05e4b70d9ad518f15800a4357b724a3ae0bb89c06

  • C:\Users\Admin\AppData\Local\Temp\Cab3759.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3826.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1620-23-0x0000000000400000-0x0000000000509000-memory.dmp

    Filesize

    1.0MB

  • memory/1620-0-0x0000000000400000-0x0000000000509000-memory.dmp

    Filesize

    1.0MB

  • memory/1620-1-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1620-2-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2652-22-0x0000000000160000-0x0000000000269000-memory.dmp

    Filesize

    1.0MB