Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 15:32

General

  • Target

    JaffaCakes118_8fcd4a8ab51700965dee330c84b30599.exe

  • Size

    748KB

  • MD5

    8fcd4a8ab51700965dee330c84b30599

  • SHA1

    d88379a8da15bab14f8dddfbcb4f756706fe04b1

  • SHA256

    a668129b24663629d0af5e2e3da4683534f2e0cc394ed5e76a77d9cca3d49eac

  • SHA512

    417597c081a64556d068231077807d3175803737514c637ab04951b7677d74edd5b040b5e9f7d9c2c05f5f4a1a0fcecd6654ca8a01892ebd3f43c1caf09bd7e8

  • SSDEEP

    12288:6J1tZbQ/N1XsS41O6eoKB4we2Qxt1w90UPltUsADjhDbQVQaVCHwjDxTifbh2Qdq:6Dbk1XsS4i16we2Wa085VCHKTifbMQdq

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8fcd4a8ab51700965dee330c84b30599.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8fcd4a8ab51700965dee330c84b30599.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\add.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\add.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:288
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4b67f24461c1bec49045e40a0be2a3b

    SHA1

    4b9bb2963d63e7661c203b72a2645c8925dddc91

    SHA256

    52232a255338c33c3ecd51d1f938511f4ad844e764f2d41497ba059e75bb0152

    SHA512

    bb9c5c431f728f9eb2b830fd6633e117a5709ad8a1f80a5d9d4f1062896680f2df1cc98236eacf6e5c500704ce433ad2bf345a432591fb6d25ac2c1029e0a0fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91f76701b833a3ef5f3a80de5575bda6

    SHA1

    60ad73f30b3e657f0434ac5144fdc62e0f147591

    SHA256

    31d7e35773cab8f9bfc350a2e788f408c7860fa2d1268c8b2efedc3e5365f925

    SHA512

    9e891760316adcd674e46ba716a2c1c31ac3a80e8b7b0e89365d6b55e46fef34e09cc58af46c798b57d63c0c34186a1fde3613339f68593dfba076a55e5077d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36a90874a6073ef5cd5b364070b0fc16

    SHA1

    819f972c74a0b41e1c21043307cf4517de824249

    SHA256

    af99fa8a13db0b2306a11018ede1cbf47924ba0fb22971d027a557363ec7985c

    SHA512

    c65e3c5e79331aadeec387139730d70ebf2ccc2b528ee4b712dc679494d9601bc68ef4e99625054bb9154f8171c8ea52fc741ed7dcbf98601df37b80cf63ebde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e12abbb382a13e018179f8be3a1e7b07

    SHA1

    329aa6c3b3c537f8ce3f767f49c9ca461bf189dd

    SHA256

    f3b80e2ecbec4a8a6519dc6d1cea4f372f7c0ba2668ab1ead9963198f01bcbbb

    SHA512

    1eeb918b42f3ff1a78484cf9eae94e7b779cbeb89009895174948a4d2488ef99784402d005b3a6f9d4a7d0ba38fb95877502f924566ab4f668460d365f1e4f94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e51a2a3ef1ab30924d36ec46a0298bc

    SHA1

    cf7d866134d673642982ffe3305976045105a459

    SHA256

    060d42af744556f0106e682df63860e29de1bfa69d773d565c9c3700fe78128c

    SHA512

    bc322b528bccde5c77a1d0aa2b862bf124fda3f1c79dd18d237768d141c1b468334d721c2b0a9e060bf990b75049769204293a9e04ae6cc782ee4b920b2f6cc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    938a7bdb3c4eff738a65a91e4b7ce52d

    SHA1

    204d356fd93002b6da2b1cccfe9c565a2d77d6e2

    SHA256

    7c7ae7a7037e7b63ef3d0b8afc1bbb2bc895cf41bf54da75e42596b4d235ca38

    SHA512

    e280087a25d15446ef0fd2ac7009d1efcb9c47abd377383fa0343af0ffbf0c9c0c782daadc23e1ee73d1d6ebfda7648ec7fb135a161ebea6e98c66f182249f72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    865f165d777e5c64deb514b364946195

    SHA1

    6abb6d6adc2c408bee7757f5a32605a667fbdb03

    SHA256

    0ba6ca72e4ccfdba13c095f4db42d388bd4f4cf222156bdf9f63e795f07f8ac0

    SHA512

    3ced3fdd1d26fab24f513828dacc16673c06f14f30317139bf7a6bc0d03cc16293795c675e0f5977fb3941e8251dfa1009871c16a517d9eee7adcd8dbe55fb34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb235c8aabfcdf7e010aa30c2c1e33ca

    SHA1

    b3ac3cfcd2800349037d108801a9192782195eef

    SHA256

    fd831d9f02a14974803578745bf268cf663bfba07ce3750975d098f3f74f6595

    SHA512

    08a2dc0a1deeacb285c7ca65e0a425d2d4ba567cc2a84472a45b1091d4b1152382409b7a2ccf494bed225c4051809e8dd9b6bea9dddbf6e32c547aac6b51438e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ac608bf7af3a7a76377de5dfd5433bf

    SHA1

    91f26ee93a878edbd39ed8d262707de4f645db8a

    SHA256

    a88c98f0d4c4319a7b3726f9cfc9da5d46eb8555bbc12481f460b686dd34c622

    SHA512

    f2ceda0c5af735d2dafff15e2838b008ef1382bb611c4e6cda7e8a3ebd58ad721ac6877ecbdd8c3ad0caa7fd081c19633e2ef4e602474151895ab987fcb1fedb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8339c6d6c0d306a31990dac759980427

    SHA1

    685b9692c725752941884b2285e4b9f11e09a654

    SHA256

    540565bfb5ca5e41de7da9b9857a0895c5fa381b2d519e43f1a999a0813117ca

    SHA512

    6496d9cf1d88a02ddd346c8956975c6e88f2829b861b3243200589466faee13bdce1c8a3ba7bb8b149a3d55445aeeebfae8772618eac365274acc5478ed18ad1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eacc4f4237cf2043468505455304e29f

    SHA1

    03750e5587ae462ccd1bd7b63f96f1be21619605

    SHA256

    d02afd370fc171534f17f266954a5ac4258927c51f00d3c72043a1f1cc77ba34

    SHA512

    a81e41b127043b8a2a861024c18e0807e7da39811667cd204d3f50ab58bdd44e5b29e2b9da5480528acc566c773ef7f323f07dde6d44985995dc57ae9bea0b57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3bf28b6510aba3787dcedb3494ea835

    SHA1

    f898803f3affe36254faebb55b37191aab1378a1

    SHA256

    25daf758c96c2eaf9ae51ef884f9ae6d0beb03281efeceaaaefde7d21d3c0b63

    SHA512

    709e1b4668eafaf8b2b7611c5e516c623e421417ab060103b8297d82a48dfca3cff178959d594e5ea228cfb38a3dcc8ec1638de8034845dfb03e64fec01ee3e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6aedfe32b8f0b5a54304f70a9bed970

    SHA1

    a9d7faac9c6851d4f50c77bae2c35102d72fc856

    SHA256

    7c7ccf69994dd569e4980c997a113d6ac4fe6c764618690a881e840a56ba6a9a

    SHA512

    061bfa53b5ea6dbfea7dba427359289ee94adc381571ddeae3f8258e5a1ca13ba040ffb1c6c4f3e5be95eb572cb968c15a08f25bfde79d3b751ad829d12035c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    418254dd412a12456b232dcfae254a4a

    SHA1

    1b691d8ec063dc258ee524ffe81018efef2a2b4d

    SHA256

    8c629d0049f333133f9726d97bd5fb7dd7dbace2c31c55c71dc996cf567c660b

    SHA512

    51f37de0359f7c3ba363dcda6ed879e780f3772d213edb4c1fc36165842b1a2fbc203a1ad0e2dd04a7759578a76d341ad1f77a2ce126735dfadb3a9d200ecd38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc8fc2f565dcde29f538b0c61eed119e

    SHA1

    049cc4713b5f35af6bb9460c9437e5a6167bd85b

    SHA256

    faab20785a0a4f05bac9906cec8edc6293414f5975325bcf4e830b940d5cdd58

    SHA512

    ba54ab767dca7f280912ade89ad6343a23108604fc1498a1354672c8e558f54bf1cdbe476924b4bfe3f87a416a37b48eb8b5ceda1c077ab3153bb2b823aec8b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d48ec510795efbf49f5294e69d9c8e83

    SHA1

    332a2ac7b74f97480c4d72d12532e2064daaf751

    SHA256

    89b8c4d44c72fdc10e3475d40e3c2c18ea80f6242690323b9e6b9da0c721b832

    SHA512

    692c51f9da36ad18de82e9e46943dd8662e6b75866b1eb3d375beb575e9c7456224d0b3d1ca5d2a1bcb367f21bc6104be5e6945a95b0a8976ae589387294ebf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cfd4544e6be9d69c08d02538b5fe10a

    SHA1

    cb90593c59b44c455fbf56d810392f74203327d2

    SHA256

    fc47681bbd1b4f578d0a194026f6584ca24c4c11b38ad60e9fc3925f18189d1d

    SHA512

    3c4b45dfae3d1f88057125098dc55268077346fd17fcd91e1a1ab1787135dd244cbd3080a6045d49e0cacf06900ce6f4cd93394d08d6f4626cbcbeb0999bf5fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b73fa2d8df7dc911d3fe7e4a08b9e2ef

    SHA1

    abb8a2ac65378f790ece7f379a88e00c95e1f00e

    SHA256

    6caedc3c3547f0ffd003a320d33ee14ef20888af15ba4ab268c141035efc74e2

    SHA512

    f70aa55e55aa84457b860307631539689547e5408ae7edc5c10b8cfc99f9bef644c0190a0ed90b249ae1b521e2b2e7e42b651e9cf0bed4b7e42abcef270a8c51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da63e5069a399f2fa326227c7a1b7ddc

    SHA1

    f60dc1a0a8875ac9148f269c03b4a183e444336a

    SHA256

    b4fe1ac4f47041e1ef2531f65a01f2d6879b48b20276d748ac67bd7e24f7ae01

    SHA512

    5263777c7bfc07ce144e9dcfd25c59e513d4251087c30871cca06d172159e6e7cfb37e5830d82f723062c206dfcf9e2561abad0f94f3c2ae55796f1638d08a67

  • C:\Users\Admin\AppData\Local\Temp\CabE552.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\add.exe

    Filesize

    693KB

    MD5

    5cff2e754fda9807c74fca18a849e643

    SHA1

    68b72c6e95075d14d6e18921595f1302c9aa884c

    SHA256

    a669e51e17ddde4aef6e6218bca0abb06f953e8d05a4ee1031ea5d52fb8c65fa

    SHA512

    1ff15b67344b0ebc75a8fa3569b74ae9fc4666e3605bd9f3be00f70f2fb75b7667cf461c8ef46251f700d3fcf5c04cf57537ab19de0e861c8fbb24e01638c388

  • C:\Users\Admin\AppData\Local\Temp\TarE611.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/288-10-0x0000000000400000-0x00000000007C9000-memory.dmp

    Filesize

    3.8MB

  • memory/288-13-0x0000000000E50000-0x0000000001219000-memory.dmp

    Filesize

    3.8MB

  • memory/288-14-0x0000000000930000-0x0000000000984000-memory.dmp

    Filesize

    336KB

  • memory/288-15-0x0000000003A40000-0x0000000003A43000-memory.dmp

    Filesize

    12KB

  • memory/288-16-0x0000000003A30000-0x0000000003A32000-memory.dmp

    Filesize

    8KB

  • memory/288-20-0x0000000000930000-0x0000000000984000-memory.dmp

    Filesize

    336KB

  • memory/288-19-0x0000000000400000-0x00000000007C9000-memory.dmp

    Filesize

    3.8MB

  • memory/2100-8-0x0000000002790000-0x0000000002B59000-memory.dmp

    Filesize

    3.8MB

  • memory/2676-18-0x0000000000250000-0x0000000000619000-memory.dmp

    Filesize

    3.8MB