Analysis

  • max time kernel
    135s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 17:35

General

  • Target

    16e3a183e85d12f233f94a0eec7072c5_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    16e3a183e85d12f233f94a0eec7072c5

  • SHA1

    0fb06c1d9fcb4ab06141de860733324f1f8bc4b2

  • SHA256

    64d9c4dfb303ddce01dc2953b451559ca8e2e3036bdc99fc26efb2c45e052f08

  • SHA512

    fdfcd8ac47eab7a4d80f843b9e9d6e89af8997f8eaa8623b6f102462738b8faa7368542c69d7800f9c9301804c2d57315874fc382f864e7adb4336571407fde3

  • SSDEEP

    24576:TcCrn42vGV4rb/n5c5EdJzv9yWT7LkC4EuQnECjbQKGQ3g5N:TcCI+zdJzlfT7LkCyQECjbrY

Score
10/10

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16e3a183e85d12f233f94a0eec7072c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\16e3a183e85d12f233f94a0eec7072c5_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe
      "C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice101.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\system32\calc.exe"
        3⤵
          PID:2596
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2124
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\DelSvel.bat""
        2⤵
        • Deletes itself
        PID:2204

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\DelSvel.bat
      Filesize

      212B

      MD5

      e02a04c903e2fa38f086dc968f97a600

      SHA1

      1817121c3ba605a171142a8caa5219d732e43ea3

      SHA256

      4d55e62d5c5182efd3cd495bcccbeeaabdd81623560507a89e7c11c769c0eb0c

      SHA512

      f5e1c18548d384f5d2aaede05656fd79f740827a72934a1118b74bc32048e467a7f05105b46f336889328ea928c7b4d2c47976cc1632e7ad9b4059717cddfaf5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      f77c4b6722aea7f280ca92f563c63ca8

      SHA1

      95c5cb5bcee0f9d51efe4ec0c473bf419543c431

      SHA256

      70779fa5e502421595017bee67b97af3b5d60591a20c9222c26a3e402fcbb46c

      SHA512

      0c18f518a5abea2407a668f67eda370f812e21f276145f717cc3689af24e8ab4de68c4aa8964b28f4db087a2506f45680f346478fd55da2cda1af2f7f7344464

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      7057c548aa2b2f98c79c41cf434613a1

      SHA1

      d052a2e56b27a181bcc04a29be8b630cd1b19cb7

      SHA256

      8a641f4098335baa11bc0dcffb5ef8693088a927e5ca83e3be66756a1a0a50ae

      SHA512

      70eda6054e99fa5e38cdf029ade4e7afde300c3becbdf2637033bb09bd9a16638d5e6760a3024102127e410d7d1222cc7a5e20c6e0d1c2278167417fbec92742

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      085a10c761caf4be9dd1a6feecd8d5c0

      SHA1

      e6070ce40ab69dcc82b1ca1bd044c406e8c6e31f

      SHA256

      418115fadccf811edaf4b91daaa4baeec5bd59c560911f1b3c0035522e1b7ad8

      SHA512

      9a103867e19a427e216ced131bbfc6bfc3f3d9a52d6b06b35d5f94982555af40697b128c2001a18419b15315145340e78f01e7385c7117f350e0da940dca28c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      71c830f6008f1fd2cb841da4fb0e6b03

      SHA1

      b05d4b86e1bd3c13a33f1f1f23f442029ddee7dc

      SHA256

      7dce7c9c1e22cc259f6f61a8efa3c8c9dbd0849011603bd50b49b10df2cc2b30

      SHA512

      3ce6b33a9919261b80208dd3cd1acb4f2167914199124bf353851759445b59cb919e48cce497370d1b645f2fcb3e173aa0c4908c1a82d13902cbb84301f0c52e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      cb702fe0d61c643ba67ba6f88761a8bb

      SHA1

      479e54a37676a8ab19250f17cff80955a71c8565

      SHA256

      d9a4da14d20f254aa536d695f872726e1e20afaee2125fbcef24ecfa663214f5

      SHA512

      68b6b26b8f0530221fd4ee2d8094e344d1f0053a5c22201ebc92f88d611da273f60560efaa39eff6d01170623ac9cac344e9ac16a41ca14c0bdce5e400a9f9bf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      feb508ef3dd3516ca9aa4304b07b847a

      SHA1

      d3aeb5718b70abe4251da757909aa547cea7bfbb

      SHA256

      92a8f3726df1d8f4fcb27530d220567a3480ec52c4067a510a97571de4955255

      SHA512

      dd0e31436e9ff1f3ab91b795c6045f8420673a54845c28ca32c746c9ac02ded70e693e80ee58c72eab2d1ce5295b9e1bdd1e0a051b89ca4f75acb532c2c7d1d6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      9cd397207c83cc6184bec477c9fc94f2

      SHA1

      2a3f44d8f79243ce8e9df8a10d7a44c53effaab9

      SHA256

      d85da86b2c6c4933b3da00afffa079cc97beac3c314ae621e9e973781f1531da

      SHA512

      1af3bf4c594229a04feca140d3e6d75194a06f951633359f18a2ee89073fb0a158fe1f9a1cfd13214770ab166af3d838591455bc55ca3d2391245e9eeafee34e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      fbcb6af650003f71a0830c6a390104d8

      SHA1

      555c724529d45a94592223746034eb0bf6dfe6d5

      SHA256

      2c013d9cf3bb0f6667d3325a45f1dc13adebc06b731a87f45579526593dd0b27

      SHA512

      1da78f16e34e431e7c207fc909c1ebbfa1dc41c462372cc81eb5dbebd1397a09cd236b525d80b89875fee922eae4f6b869e786083004ba7a8ad9ac2654777df8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      766471a413e99d006dcdb2dcb77884b6

      SHA1

      4c7b719629dad2490d34b0fb0a1c45136a76624d

      SHA256

      149cf75a50718d98fc975d098ff6d3e30ac9935efcda45e7ca0c9d1eea0248be

      SHA512

      54ee5a227c021b4c55049e9704b82d3f4e0fe5e362e5faa8b42bfd793a709df519ebb5ad437e204530c62622d18c0302305a0d108e95dd1ea0dd74b9c94279ae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      36846ce6b26a5762a7e7c448c0c5b88e

      SHA1

      0dc9df74dc6e235fa2d78d1aa1d61c7a0434b890

      SHA256

      13b59366493c28b4b8878be1e126ecb64e3de92e9da16475baf1169c46f6101e

      SHA512

      4b1deb15fd29ca09cf448f308a1deea95bc68b5a3542799f2d5f03d07ad8ce323b845c6dfaa69c1cf776a0391a83f32466826379452e743d8b284e56212bcf91

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      29d5871542494ed2ca4ddcdafba22386

      SHA1

      71b860a1c2b28e992c403a693472b4a50e6ae152

      SHA256

      19228239d05e9ad101ec64f8d64cec59c2b4345526eca2fc0a75b406621b21ef

      SHA512

      179cccce8d4293b1b7e332b34794fd9492f63d13757eb6fef251b7480c63b1b6c92e159655f571bcb6d429cbdc39f75599e98dcd1fe38325430893e4c5a7e59f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      92d948e0411ea1d63d4d9af3e4cb19ce

      SHA1

      29f594a85f6093c606c9d767bcc9b67ca98ecb0d

      SHA256

      c560d782d720970d585debb106580aa39a57840205ef5122163669911ff08074

      SHA512

      17fbca63388577af55323fd77c369538791efefba925eb3fb5081b3d8b1cb2501094259aa367cfb452ec347b58684d90edba30dc68f6b018528bdafe181b72a1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      c58151dd9fdad5c1aca1df57d5460efa

      SHA1

      7a1ab3cc62c89493fb9e48e5ca36f1cf0d3499cd

      SHA256

      34282940434a22d825835af0747daf2f7c0ab6bc606a3e65a8e8bb62e3bc2105

      SHA512

      d5dd4fc7a1edb3547251da3a9298641dc0b45580c93cbd9080b2f58b4597ba911046c17c9ac59daec67bd82f340b8064e22923206eb4d7142488b8ff76b0528e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      a66904a5b7abac1d5a52b10bed70594a

      SHA1

      fdfb2fb0cf217d53a464187a9ab7e007309bc6a3

      SHA256

      4427f4cd83b2dde2d19ffe204cc8372e70abf4b97158aaf061542efedce1a6e5

      SHA512

      0177852411a9244cd98f79d01a0786c0fc60736e310c88a16c339e3f222eb2dc1f831fdc1110fcf6aceffe8f260a4371c705500a378656929863a04e9fc4d2ed

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      6c8ddb1b603cef6ed6df70eabcbea72e

      SHA1

      429d96d651c973472840d94fec61e802294ec059

      SHA256

      30da779a27a83c54be1d59ad7dbeee505fbe9217dd61f3caf0450d34b09b23fc

      SHA512

      57b08d4660169e3bc61f22de9235b9104a1e4a1f8b2c6efd1e6a7402669cf026659bb189d7c7d2dceaf9b19fc424e3c6c5f3b84277db0e666315d1cc997a1234

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      1b4c644bd836aba07bfa222a59e56d4d

      SHA1

      d3ee0972a6f8f19d2973fad11058d6cf21fd7c86

      SHA256

      3a68695a93f67160f486256ea2dcf8377df90991ce7507429f398c9e1c703458

      SHA512

      b7abfa33c64645d832c480ed135215506ff8523197512f14960c2691bd077e678eed6f1ecb1eb3cac5139a9797bb68dadb8ff5641d812eede0aa332b07520af8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      342B

      MD5

      75c66142a9ab51bc85bbae3d99e27398

      SHA1

      79c26ad625bbb0fb8c15719858e9f75cd50970bb

      SHA256

      14f07dedd4c593cc612e6d255138c2bca8de0dd5ff218a8685989b24e84a7459

      SHA512

      ef1e43c3c8a597bbeb7b9e50530a0c0d7a5a223f4e245b02e55d2fe4cf46a2da1e04c482d36b935389c48aa4fc6959d0b0f3b57bdc504e93dbc4e46bef79ebd4

    • C:\Users\Admin\AppData\Local\Temp\Cab2F8C.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar30BB.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Program Files\Common Files\Microsoft Shared\MSInfo\rejoice101.exe
      Filesize

      1.1MB

      MD5

      16e3a183e85d12f233f94a0eec7072c5

      SHA1

      0fb06c1d9fcb4ab06141de860733324f1f8bc4b2

      SHA256

      64d9c4dfb303ddce01dc2953b451559ca8e2e3036bdc99fc26efb2c45e052f08

      SHA512

      fdfcd8ac47eab7a4d80f843b9e9d6e89af8997f8eaa8623b6f102462738b8faa7368542c69d7800f9c9301804c2d57315874fc382f864e7adb4336571407fde3

    • memory/2172-34-0x0000000000400000-0x0000000000526000-memory.dmp
      Filesize

      1.1MB

    • memory/2172-1-0x0000000000280000-0x0000000000281000-memory.dmp
      Filesize

      4KB

    • memory/2172-0-0x0000000000400000-0x0000000000526000-memory.dmp
      Filesize

      1.1MB

    • memory/2172-11-0x0000000002F80000-0x00000000030A6000-memory.dmp
      Filesize

      1.1MB

    • memory/2552-23-0x00000000001B0000-0x00000000002D6000-memory.dmp
      Filesize

      1.1MB

    • memory/2596-21-0x0000000000400000-0x0000000000526000-memory.dmp
      Filesize

      1.1MB

    • memory/2596-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/3012-12-0x0000000000400000-0x0000000000526000-memory.dmp
      Filesize

      1.1MB

    • memory/3012-16-0x0000000000270000-0x0000000000271000-memory.dmp
      Filesize

      4KB

    • memory/3012-33-0x0000000000400000-0x0000000000526000-memory.dmp
      Filesize

      1.1MB