Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2024 15:54

General

  • Target

    fda2de190376f0365d12784abf181542_JaffaCakes118.exe

  • Size

    321KB

  • MD5

    fda2de190376f0365d12784abf181542

  • SHA1

    08dada2a536ca580d4eb94eeee35a953551b064b

  • SHA256

    8079b09eec527a746367e9e26a0fe944321b7f37b4e461432565c4a572242500

  • SHA512

    4cc0db517d8226fbfacce91258538db75fa05cd781f66061d2aa9d641eb5bd4b6cbf1425d7f72b8bb0c32e9ca6ac33ced759d8095bccc69117c07bc034b4fa79

  • SSDEEP

    6144:rgg/nv8YotwxoMsQNtMZTk+KUd/9SYq73ckuNBQ9T:rzvbotweLQv4pKUjSh3ckuN6R

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1784 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1520
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe >> NUL
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08e0acbc7d115a8d460aa78762ec4ab9

    SHA1

    a52315a0103281134448e149d1549eded8aba201

    SHA256

    1a385aa1cef8ca807ea61cbdcaea0e8c32faae433aa7d63448c34a776850a9f3

    SHA512

    0c55156a2df6605cc4d6d8d75e6e85ba4f8754ac4d9cebcf817825f6de1df20974211584b50ac0f9220a92673cee30eb7d00bd062b7c428e010509c6ea01ca90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97af64b8a8a2aa70bde4a6d163e67d24

    SHA1

    67c5b6574d361041f1f58e9b54aa3ce9e024beef

    SHA256

    d5518fe79e1174c751ffd03bf17c7cc4ebffde08778a337a7d511358d6bb37fc

    SHA512

    af42dbacc55d14b765bd1a6fc4cd21416ee77ac1120e5190898e12845deb21ef8180c6ae9dbb2af5d9879fee330e75cb83b401f1ff06f7dac454f2b4b34ef1f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf87e8ff38405b59000cf84d25554cc2

    SHA1

    7a25dd2b77c9505d370278a7b7ab06f728efdcc0

    SHA256

    02158b63aa737b728bf677e8f8faaa42ce087a9e57880990862fa30f272e5b46

    SHA512

    1eb711df3eba2e14d54af935220c639bc7cba42721081734f108cb643e2c65db85d2b26efe6676e229f8a8aa913a1a83981f5ce843646d38753f1fa2c437882e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d47a3e81ba7eac19bbec76cd7242833

    SHA1

    57260675129ebc1ca1537543fd938772b4d8c48b

    SHA256

    06bf522b02a6d082752bad56f4fbe805c87522cc55db38e6c797fafac79084f0

    SHA512

    5d9cfb9349ffd447931e9c445511ee1171cc39bd8343949f79d9604301dc9a93d7c10de4ab4593920f86cee136d2a3e0fc978d2fa1c5ddc526ee56653f5b2875

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34396088fd2ff38b4f95b7bbabf825dd

    SHA1

    d56f3fe022dd6b18cc09192b6aed8eb49ad979ae

    SHA256

    75aa75a63d9734899af98827225e62caddbb74a05747cf1f916ca3d99ba91c4a

    SHA512

    fb689dd8ef4266ad9975c1ee746e76da30b8d6c0e63680304b39ff894e79796ac95762f299bd202d8669c6412dc62ea852299aebe8a187c4cdad1915106bf8bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e232756db3e1f21cb63ddf1cdb7beb28

    SHA1

    df0510491eb30e7716c3e6888da4914f8501c225

    SHA256

    737b395337b738d09c418ae066490ed5cc8b88f3d11db5b0d394826b4077ba4d

    SHA512

    0679c1ae6cc68988d3f6eebb07665cd8232433a7c34ad128b0ad0325f57cb095c0ba03d0a49972e23218b441b1aa95fc648ed78c937abae3990f0fc5afb52da2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee461b378d8b37ec04088a9e6073d6fb

    SHA1

    43f4b62a76f572d3e5b26c6d13685b36bee9f752

    SHA256

    cbf95a27946c181405cf1a2aac84c0d044b383931ee4bbdcab028a482e7e0831

    SHA512

    c03a91b06f1fefd507c98200b530213dfd175984677695d333d1014c8b3f730c511e4f4e70ea3123e003127ea8e5b77007f09dcb4fd585ceb43aae03a1781ba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd27c33f5352be112d92bb2d38473b5c

    SHA1

    22d958a79252f14db05f9b94a4c574589c4b2a1b

    SHA256

    e4bf67ede5f0def1b3a8570bcc2af7075be4a836fc972e91ddeac90d996167ff

    SHA512

    bc8bbc00e1961ea3411b39edb2fb9490ac7841cf79204664092b6cd822274beefbc633d98d09d812fef3426e19d12840b73854e26933fb38e1b4eb1e901df631

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c9bc18b79725de54f8f484f20ab8c28

    SHA1

    e0d551c49d7805018a9ebd25d7beb93ca04f853e

    SHA256

    37375b3dc6681c3d72bb3a5dc69c1bcadc55f6663793dd27caeb44ad2b576148

    SHA512

    dd10eac624e5c420173041a343ea473384830527efb6a7504f6d44a6be0fd8bfa8ec450056e26d72ff27fae61bf0c247ced5a74e531412e9f39675044565afa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83844c6ea24998217561c2ba96cfe75f

    SHA1

    331b09c30d2dcef501acd884c7bc76e64e05f858

    SHA256

    aa57841bca34beb091d3e06e579cfecbe2da3be36225bd70f6634e983516094c

    SHA512

    734086a0233bf0905e43f74fee5de1d45dd4c1a2fda9e647b523a344a41db6f5038be5d08aedca283fdce3cd945be00af2213f016e3327017acab8c469b77b36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c787de906b1a27d4102827490d38b09e

    SHA1

    542e30b5cdf98f6cecb3d89daa9c0bd9d1187a2c

    SHA256

    1d5c534e6631a7f9f7994957fb70dcd8f7b9e5ef6b07e614ee65b0888ab9384d

    SHA512

    7c9d0927c18f9088fdab2f31221c29e30b2143f0b5bb0aaf98537eddcca19b7738630b48c62a454e7b09cd54773bd8e5fae4717bfb75fd0acb5e031d92676f42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    228b92d3e4295f2f68ba4b944c772c97

    SHA1

    6ca582597a3a100210cc54e1d02cf9f558309f48

    SHA256

    058607b39a387489340b15d813f930b15323ea32acfd8b61e91d7e4bdd0837b1

    SHA512

    f9b9d576a016df88eb1cfaf57bc2b4ca936fbc6cc24a7e2657f431aeb651f0d77d403c2097d38ba39c44ce90cac01c8c84709337e3d7fb4e22fcc3da9141b8dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    396a5772e4f1bd240a8eb1579b656d29

    SHA1

    7a3b324ef419cadbcb44a787b3c2c157bf17c860

    SHA256

    470f594b89665a0dcf571d170d046fafd0a42304f377b36ee2a2f5a06e36cc17

    SHA512

    6706b81e0b9fda4b4208acf0f457669496c95c83e7360f1d05170a290ac2c3ff7c09f4d3cad85a37d3c43d05e1b47d834cf8e27d4f0ec0b8405c8c2bc7638d68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb27d3c19fb0f8075572d9fbe12b01f7

    SHA1

    51e83dd7e1594550a83378b97dfc9201e152e65d

    SHA256

    916e14e58f0b76578e4b89ab0561dac0578c4eef930c38da603130f0acd25e11

    SHA512

    0375bb4d9f93306b95b4821fdca4edfd07ab575b7635d85faef675a701cdf78b25875cec44b18291284b5746c0aa7f8cdc6cb9e1387ca9ccbd567abb921fa4e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59d48270a285f1accc36be98f64c4c90

    SHA1

    598f8abb9e0f53115433e430fbd5eceb8edc153e

    SHA256

    db53af27f68c48dd6f537f3b1f0afb69d3050ac8b7aa0588bdcee6c7b7034d34

    SHA512

    950b3e13c39235d1c77f5aea5784b5ff1fe537534342d37ebd7f4293921958eacd6ebbcea490df75814c49ae81b2eec179d16a8d473e87587e516fcdea416bc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    161fb7cc66b604afd4935695e0dcd42e

    SHA1

    74597936dea5471821f11a4b239760cf4c2e30cc

    SHA256

    92f6ad5a5ccfd7d6303a0c11a9e34be9ee043c143add8b746915e986a7fcdfff

    SHA512

    80a6dc6332e2487ab7c6168c2e1226ab15cf1231660ef45fb16d91bace381cd2f694b7deffda0f51901169e81eee5465129bda48aeaac76b4cd884ca14d4eeb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b851912e5b34fc7ff9ba22b62532702f

    SHA1

    02ec5f52fafb515d2dcb799bbbc867bd5535f84a

    SHA256

    23418c50c100f3b44c95c8ef5caca82cceab11a8f63b76ed1fa7a911e9d35e36

    SHA512

    cf89bf97cfc393ee1baf279803d0d898af2a87099b91ff71afb526e8371ab1e9b65887fe28780b5fac6df0bbc29bc68422c2154109033ed0537a0911e67c7917

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a7de4c4cb21795040015ffaa9aabcc1

    SHA1

    cfaeca3c189073e2cb3f6f1612184c4395f677ac

    SHA256

    f5e777a2b7ca912fc95400ddaf9e49e27e66af271a7067f000c8d54fc1ddba25

    SHA512

    705c902b467a9667e06783cf06495ac541bd5518e3793eecf21bfe4d43477215172edb70ddbc5ca5064eeabd1ae23a35489780e3cd7005d284cbfa44e1d29a6b

  • C:\Users\Admin\AppData\Local\Temp\CabF634.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF6B4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1968-0-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB