Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 15:54
Behavioral task
behavioral1
Sample
fda2de190376f0365d12784abf181542_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fda2de190376f0365d12784abf181542_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fda2de190376f0365d12784abf181542_JaffaCakes118.exe
-
Size
321KB
-
MD5
fda2de190376f0365d12784abf181542
-
SHA1
08dada2a536ca580d4eb94eeee35a953551b064b
-
SHA256
8079b09eec527a746367e9e26a0fe944321b7f37b4e461432565c4a572242500
-
SHA512
4cc0db517d8226fbfacce91258538db75fa05cd781f66061d2aa9d641eb5bd4b6cbf1425d7f72b8bb0c32e9ca6ac33ced759d8095bccc69117c07bc034b4fa79
-
SSDEEP
6144:rgg/nv8YotwxoMsQNtMZTk+KUd/9SYq73ckuNBQ9T:rzvbotweLQv4pKUjSh3ckuN6R
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1968-0-0x0000000000400000-0x0000000000457000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01K81C5T-YL0T-5A81-Q276-867WQ80UG33I} fda2de190376f0365d12784abf181542_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{01K81C5T-YL0T-5A81-Q276-867WQ80UG33I}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\cigicigivip32.exe" fda2de190376f0365d12784abf181542_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\CigiCigi2OO9 = "C:\\Users\\Admin\\AppData\\Roaming\\cigicigivip32.exe" fda2de190376f0365d12784abf181542_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fda2de190376f0365d12784abf181542_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440785560" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{958BF3B1-BE21-11EF-B462-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1784 iexplore.exe 1784 iexplore.exe 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1784 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 30 PID 1968 wrote to memory of 1784 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 30 PID 1968 wrote to memory of 1784 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 30 PID 1968 wrote to memory of 1784 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 30 PID 1968 wrote to memory of 2512 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2512 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2512 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 31 PID 1968 wrote to memory of 2512 1968 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 31 PID 1784 wrote to memory of 1520 1784 iexplore.exe 33 PID 1784 wrote to memory of 1520 1784 iexplore.exe 33 PID 1784 wrote to memory of 1520 1784 iexplore.exe 33 PID 1784 wrote to memory of 1520 1784 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e0acbc7d115a8d460aa78762ec4ab9
SHA1a52315a0103281134448e149d1549eded8aba201
SHA2561a385aa1cef8ca807ea61cbdcaea0e8c32faae433aa7d63448c34a776850a9f3
SHA5120c55156a2df6605cc4d6d8d75e6e85ba4f8754ac4d9cebcf817825f6de1df20974211584b50ac0f9220a92673cee30eb7d00bd062b7c428e010509c6ea01ca90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597af64b8a8a2aa70bde4a6d163e67d24
SHA167c5b6574d361041f1f58e9b54aa3ce9e024beef
SHA256d5518fe79e1174c751ffd03bf17c7cc4ebffde08778a337a7d511358d6bb37fc
SHA512af42dbacc55d14b765bd1a6fc4cd21416ee77ac1120e5190898e12845deb21ef8180c6ae9dbb2af5d9879fee330e75cb83b401f1ff06f7dac454f2b4b34ef1f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf87e8ff38405b59000cf84d25554cc2
SHA17a25dd2b77c9505d370278a7b7ab06f728efdcc0
SHA25602158b63aa737b728bf677e8f8faaa42ce087a9e57880990862fa30f272e5b46
SHA5121eb711df3eba2e14d54af935220c639bc7cba42721081734f108cb643e2c65db85d2b26efe6676e229f8a8aa913a1a83981f5ce843646d38753f1fa2c437882e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d47a3e81ba7eac19bbec76cd7242833
SHA157260675129ebc1ca1537543fd938772b4d8c48b
SHA25606bf522b02a6d082752bad56f4fbe805c87522cc55db38e6c797fafac79084f0
SHA5125d9cfb9349ffd447931e9c445511ee1171cc39bd8343949f79d9604301dc9a93d7c10de4ab4593920f86cee136d2a3e0fc978d2fa1c5ddc526ee56653f5b2875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534396088fd2ff38b4f95b7bbabf825dd
SHA1d56f3fe022dd6b18cc09192b6aed8eb49ad979ae
SHA25675aa75a63d9734899af98827225e62caddbb74a05747cf1f916ca3d99ba91c4a
SHA512fb689dd8ef4266ad9975c1ee746e76da30b8d6c0e63680304b39ff894e79796ac95762f299bd202d8669c6412dc62ea852299aebe8a187c4cdad1915106bf8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e232756db3e1f21cb63ddf1cdb7beb28
SHA1df0510491eb30e7716c3e6888da4914f8501c225
SHA256737b395337b738d09c418ae066490ed5cc8b88f3d11db5b0d394826b4077ba4d
SHA5120679c1ae6cc68988d3f6eebb07665cd8232433a7c34ad128b0ad0325f57cb095c0ba03d0a49972e23218b441b1aa95fc648ed78c937abae3990f0fc5afb52da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee461b378d8b37ec04088a9e6073d6fb
SHA143f4b62a76f572d3e5b26c6d13685b36bee9f752
SHA256cbf95a27946c181405cf1a2aac84c0d044b383931ee4bbdcab028a482e7e0831
SHA512c03a91b06f1fefd507c98200b530213dfd175984677695d333d1014c8b3f730c511e4f4e70ea3123e003127ea8e5b77007f09dcb4fd585ceb43aae03a1781ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd27c33f5352be112d92bb2d38473b5c
SHA122d958a79252f14db05f9b94a4c574589c4b2a1b
SHA256e4bf67ede5f0def1b3a8570bcc2af7075be4a836fc972e91ddeac90d996167ff
SHA512bc8bbc00e1961ea3411b39edb2fb9490ac7841cf79204664092b6cd822274beefbc633d98d09d812fef3426e19d12840b73854e26933fb38e1b4eb1e901df631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9bc18b79725de54f8f484f20ab8c28
SHA1e0d551c49d7805018a9ebd25d7beb93ca04f853e
SHA25637375b3dc6681c3d72bb3a5dc69c1bcadc55f6663793dd27caeb44ad2b576148
SHA512dd10eac624e5c420173041a343ea473384830527efb6a7504f6d44a6be0fd8bfa8ec450056e26d72ff27fae61bf0c247ced5a74e531412e9f39675044565afa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583844c6ea24998217561c2ba96cfe75f
SHA1331b09c30d2dcef501acd884c7bc76e64e05f858
SHA256aa57841bca34beb091d3e06e579cfecbe2da3be36225bd70f6634e983516094c
SHA512734086a0233bf0905e43f74fee5de1d45dd4c1a2fda9e647b523a344a41db6f5038be5d08aedca283fdce3cd945be00af2213f016e3327017acab8c469b77b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c787de906b1a27d4102827490d38b09e
SHA1542e30b5cdf98f6cecb3d89daa9c0bd9d1187a2c
SHA2561d5c534e6631a7f9f7994957fb70dcd8f7b9e5ef6b07e614ee65b0888ab9384d
SHA5127c9d0927c18f9088fdab2f31221c29e30b2143f0b5bb0aaf98537eddcca19b7738630b48c62a454e7b09cd54773bd8e5fae4717bfb75fd0acb5e031d92676f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228b92d3e4295f2f68ba4b944c772c97
SHA16ca582597a3a100210cc54e1d02cf9f558309f48
SHA256058607b39a387489340b15d813f930b15323ea32acfd8b61e91d7e4bdd0837b1
SHA512f9b9d576a016df88eb1cfaf57bc2b4ca936fbc6cc24a7e2657f431aeb651f0d77d403c2097d38ba39c44ce90cac01c8c84709337e3d7fb4e22fcc3da9141b8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396a5772e4f1bd240a8eb1579b656d29
SHA17a3b324ef419cadbcb44a787b3c2c157bf17c860
SHA256470f594b89665a0dcf571d170d046fafd0a42304f377b36ee2a2f5a06e36cc17
SHA5126706b81e0b9fda4b4208acf0f457669496c95c83e7360f1d05170a290ac2c3ff7c09f4d3cad85a37d3c43d05e1b47d834cf8e27d4f0ec0b8405c8c2bc7638d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb27d3c19fb0f8075572d9fbe12b01f7
SHA151e83dd7e1594550a83378b97dfc9201e152e65d
SHA256916e14e58f0b76578e4b89ab0561dac0578c4eef930c38da603130f0acd25e11
SHA5120375bb4d9f93306b95b4821fdca4edfd07ab575b7635d85faef675a701cdf78b25875cec44b18291284b5746c0aa7f8cdc6cb9e1387ca9ccbd567abb921fa4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d48270a285f1accc36be98f64c4c90
SHA1598f8abb9e0f53115433e430fbd5eceb8edc153e
SHA256db53af27f68c48dd6f537f3b1f0afb69d3050ac8b7aa0588bdcee6c7b7034d34
SHA512950b3e13c39235d1c77f5aea5784b5ff1fe537534342d37ebd7f4293921958eacd6ebbcea490df75814c49ae81b2eec179d16a8d473e87587e516fcdea416bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161fb7cc66b604afd4935695e0dcd42e
SHA174597936dea5471821f11a4b239760cf4c2e30cc
SHA25692f6ad5a5ccfd7d6303a0c11a9e34be9ee043c143add8b746915e986a7fcdfff
SHA51280a6dc6332e2487ab7c6168c2e1226ab15cf1231660ef45fb16d91bace381cd2f694b7deffda0f51901169e81eee5465129bda48aeaac76b4cd884ca14d4eeb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b851912e5b34fc7ff9ba22b62532702f
SHA102ec5f52fafb515d2dcb799bbbc867bd5535f84a
SHA25623418c50c100f3b44c95c8ef5caca82cceab11a8f63b76ed1fa7a911e9d35e36
SHA512cf89bf97cfc393ee1baf279803d0d898af2a87099b91ff71afb526e8371ab1e9b65887fe28780b5fac6df0bbc29bc68422c2154109033ed0537a0911e67c7917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7de4c4cb21795040015ffaa9aabcc1
SHA1cfaeca3c189073e2cb3f6f1612184c4395f677ac
SHA256f5e777a2b7ca912fc95400ddaf9e49e27e66af271a7067f000c8d54fc1ddba25
SHA512705c902b467a9667e06783cf06495ac541bd5518e3793eecf21bfe4d43477215172edb70ddbc5ca5064eeabd1ae23a35489780e3cd7005d284cbfa44e1d29a6b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b