Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 02:55

General

  • Target

    JaffaCakes118_09b5b03a03d157d590e645f0873353af.exe

  • Size

    714KB

  • MD5

    09b5b03a03d157d590e645f0873353af

  • SHA1

    498bc956b9c02554136ba4388f38e496168a394c

  • SHA256

    dc8b72462d48dc3989fd801b20584b00d45f8465d8ed4f79435d0d41333fe8cc

  • SHA512

    a6ff1a96454c993c0f6ec8601b96395b1284bd4f06fc0c8ebece304a3f726cfc91c5fd471fbe3c5d73206b3e90bcc005c21fd14ec9a29ba3b42774fb387037f4

  • SSDEEP

    12288:Ac//////XriztNU6YnoaC2WZgteSxpplHvRl8VCJqHnRSqc61S5DZzYFQHNmKWCc:Ac//////bKIWZgcCpPYCcfh1MNaXL

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09b5b03a03d157d590e645f0873353af.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09b5b03a03d157d590e645f0873353af.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09b5b03a03d157d590e645f0873353af.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09b5b03a03d157d590e645f0873353af.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\program files\internet explorer\IEXPLORE.EXE
        "C:\program files\internet explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1628
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b96d9d2b08b3106e5fc8408df9984b5

    SHA1

    e4f029f86fbfbe0d1143037ae0cde89a9110c9db

    SHA256

    171454870d0f2283ac166c59c7d958ac5a62413899e8114c33915352fd96fe03

    SHA512

    e3534948b22e8785eba0c9ca94205ee80efb3e7e633eddb64af915cc80e13469bb033871442fa485375195f8ddf6c3f1dded863e6d009425a2ecc752eca4762f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b749bfb680fab48ab89270fe9b4ca0f3

    SHA1

    eada5d8db4210c30dc2108fb20eed031f04485d1

    SHA256

    848eb002e20b6908abf3b1781a9e05f5038cc879eb35f2307803b8bb020cf67d

    SHA512

    c75bc3cf990d03b6b18794b9ed7f0dfb399e4568a5d8606e0b7c44a62f593d105f5e8704a113b12da9992bc5383f689f73daddb71b69ca18bc2243480c32c547

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    beb3abdb7254d076893a234b97a2168b

    SHA1

    2adf428e9b8dd272fc410a233d481114ecf001ea

    SHA256

    527873df15033ea9b924c7c8b7e45f39cfa37a17602a31b37ea030097f0bc3d0

    SHA512

    f22db93b7d668494163b29a1b8988cfe4d758c68f224c67eda2bdb49cda44dfd436a1d08fea2e124ddaf5d5f3ea350d096937876b3b86848dd0bc184c3d26d37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c35d86f1ed40ae3c466ac215b3af7d2

    SHA1

    68c3b3a20c7aae6b6dcdd7c7e0f01aa47f393211

    SHA256

    c4c8b850e1ad1bb0f45fe1178fd0c245953e7c0b88f53db1846a23c0954c38a7

    SHA512

    97a83a2220883f9878454b18fc729633a29597ddb5895ca9f2c79e8a9a3ba1734b1f3ee4e565b8ec1c9720b1fd9077e1edae2f5abfb06a6b4d38eb258c20b7ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff37f6a660ae911fd530ce5f6f3d1dc4

    SHA1

    b037259cbdba173769637cdeeeba28ac92d76fbc

    SHA256

    7be4097c2a6a666308f3fd2ca8b221e6e0282af7b93dd61adcafa03fb1ed6a96

    SHA512

    0c89fa6677ed06ac302cac1e2ca78fc57c600605f4ce8d60be3d6fb75365ed158b5c7ebf8348704dfce6eeecdd8cc2061ec62bfd9459760a1c9c1cf833ee58e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8aa307fcb5763f06721a071a9c55ab3

    SHA1

    78238754e955f8427e97e8e64dd6fbe9f8443de8

    SHA256

    02d902d13772309886f02d81804ed9b378f4d8453ed8f78356ba33d3a3310d15

    SHA512

    14bff42aa1a8392de60dde32991fcac6f384d320384990abe271126f17c89648cfca6b7965134ed2b2664c32b4a675a115c7797ebebb915aa80d9f56ba1d6edd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b4a937a5f4aca0717df2bbd65411eae

    SHA1

    7f22cbadd911c58a47a6b63c97659d4b4508bb36

    SHA256

    f680bab59f2e0f1ec165388a722a82a9d26db382841c197de3d344d837126808

    SHA512

    71162349a0c99e83609676c8156e4c93ad8b1e6d59c56270b252ecc1c41ed215028bad4c8af4ad2d39162801922bea9c4ae8e8d8522e745c8d3bb37b3842e489

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8834ddc9db7d47e50a9cfc4eaf95e53e

    SHA1

    91a2824dfca2fd3d37c6da325708dd6b915750aa

    SHA256

    506a27dc4929472a9b7fde85c05b05dc4966a43ad1985a3c8292c665faae3b17

    SHA512

    34afa5fca8c8e193d6d7496a42df6b69b5dff6f836b0891ea5d0efccca7a075d51286056651eeaf0e1126fdd2779b9569b96b29636dc7a8c33709390a0c30cff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa15e1646ab270b814705e172992342e

    SHA1

    2da47ed3d1ad99b680071c6436bfc36257905901

    SHA256

    7bc83585beaf6070f639cfbece4a5e8f785eaef89b34c0829f3153a775c284e4

    SHA512

    18b591ae5728fc34c8b7eadf325d3259c85822f24b119fdb0786f38186a459a79aba735e2a7a6428356bf1db5e7005d3ad4961ccf3c08c055975eba87d057a60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b518076f116c418072383aa5c66f8a3c

    SHA1

    035d21a3593098c480ee13d89719277030edd381

    SHA256

    421bae952366c1f64c720e8d43a9c1bebf9d1c333a97c1edecaf69643be91e0c

    SHA512

    2ebe3061c2d3bf609afbf83d8bd490ffefc2adbde3939f09d707736124172cd53ee73b4273b767e96f06d9dfb2f4048be937323f89bb7066b6dcc085149bd4da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1105cc02f3d81ebbccde19a3ec40eead

    SHA1

    04a4f0c6863f91d248811bf2167e17a7281bbd0a

    SHA256

    ce3ead70138ee0077e2b62423378db248dc404020142a278fba81a4592ab4f72

    SHA512

    fafd909a31b513a5eaa9e76d2d6b1bd92e5e73be7ebae7e69206b63afa675cfd36d702715d71d0c9cda11c01f74ced8df686b94755d74a8ad01cadcc315b4c3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d773f20ff514a224fbb5190775db5738

    SHA1

    73edc1d114d4fedd13921f7055c9532d63e7e25a

    SHA256

    19ddbc4baf11cc31cb707cdbbc41f85eaf08ecf9220ef7fcdb759536727a6473

    SHA512

    378aff84e3a17924f05e0e2164611a7ce49bcf56014efbfea245835b4683d5bd0c389475e71aed2b64fae03a135e47e842a59c4f905a091fdbe01b11e42178d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2da8e717ed7791119f7a0684f3ef4419

    SHA1

    8d59d032e8092a66552422ef8ab736ffd07a4fe0

    SHA256

    84465a33d667657f2e6fde2d1112f0349559f5fa1e7eeb5cd56f1618a30c45bd

    SHA512

    73b9f6e98a4c9466928bda4e8885553520d796bb269aabf3566ff7686ec4277591f8219d89e05a7ec9eddf59bf78cac2f30c763199e8b7295f047d38600ba8be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d487dc0ff46cfe40c7784a758bd587c

    SHA1

    3fbea874832414c2d38b7e85bf8415d546edf4cc

    SHA256

    98522b99acaaf952486a92e905c1916cc0a3a5293efc6d223f0a2955db647fb0

    SHA512

    4c732247a92d0c946d4e8055e2cce8f5f03047d440c7d9825254e2c423348515b3243f9c16f7ed1b55bcdb6add0c80057d4c5107fe09a97c16609ee81b0975ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70a05824cebe6a30ece638e258bc045d

    SHA1

    675e8678a143496114ba6bfb5bac9a800021ba6d

    SHA256

    95c8a4f9171ff06b24c5f9a101585e4a412b544ad07a211a17f77f31e097d5dd

    SHA512

    ac3fc0818e7caf41caffaa46f73766b783d4413c51cc653370fa00490027db4f2478dd6acdb0a501c3c2fbb7a464fd3a1cf5ab82485d4e887905791601127b91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    292d3464b5d0680d250e889ff7f4162e

    SHA1

    286a6b9402583ae9860d6220afb40b6072b496b6

    SHA256

    1b399ddd05b2498c848c8ca33177283f2baa43eef4a8c94d09db88d60e439bbe

    SHA512

    326865860601f0518d3c57b6c3091647042720b7490040714de31a5332c1e8fa9dd1af947421ac3037d5798f67dc5f1962fb101a54ca8baa834528b08a882268

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e6a19d69f0aa3f0418b3040e58879e9

    SHA1

    1d61eaf43c258779812025e4c9984fd7d7bb7cd3

    SHA256

    61cd13c2ff612fc812737dc3eca54b6412804f6d478560af5e117a459575eaf6

    SHA512

    064ceffa9ddbbdbd7ffd6ef3999fa617d2b7462e283e08fe241cef60343981d1bd9f69ebd4a0a71a7303fbdee1013bfd12114e9d0b2e69506c80b99189a7108c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b91dc13cd82f8f39c9d3a24d7816d65e

    SHA1

    0e54df4ad41b89acdd7cac05e173de17db629d15

    SHA256

    d42a09ff3d665806f71103094d4be405cb0975c928a9eec17bec11fe91fd7580

    SHA512

    abdde106493add5eb4245bd7f9c97eb2b1776304ae238c987b6836f5005c1eb842bd80375114bd3f35c634e521c1e87e162d2feda18c32a5ac732b31d5966d70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    389cd815df12c0b848b3c4657e74065e

    SHA1

    8811f4ad5f6242c8199870ad90f9738d9b6f1227

    SHA256

    009855eaccaa4b8cbd3ac7b6c4fe1d25b20cbc749a2a5183cafe8b117f105959

    SHA512

    d28550d82ad163c8de4bbae3fd3222ee7b13df8fe37c3ce869a14a5a36e0d31c140eae9c952a24941ffddbf7fc1ce92f1295eebc788c51b2c48238613bf805aa

  • C:\Users\Admin\AppData\Local\Temp\CabD58A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD629.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1628-12-0x0000000000060000-0x0000000000119000-memory.dmp

    Filesize

    740KB

  • memory/1712-10-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1712-6-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1712-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1712-4-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1712-2-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1712-7-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1712-8-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1712-9-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/1712-13-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2632-5-0x0000000000400000-0x00000000004B9000-memory.dmp

    Filesize

    740KB