Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 08:15
Behavioral task
behavioral1
Sample
4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe
-
Size
397KB
-
MD5
4545fc10b27ce3bb20b5cf9a41cac84e
-
SHA1
fdd3010c7fa4c126dc88b4fff1c2f0f807eecae4
-
SHA256
8817202fda09d9bd88681a85f470400b1a9cc63d147653b230f09ce94c11e2a4
-
SHA512
04c017e983d4740b8aac48e58df0d92356c2efee400a42c312456563b4e236d78b5d242a9e9692d2e343561c69b71fed2b5540b041bda27e8bc5ae7e487f0887
-
SSDEEP
6144:cLy84u9nSO2GjZkD10BIY3rb1YfBdfpoZ3u/Ht52w6JSeiFPXVhP:I+u9nx2GjMY3XKfd/H/9PPP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2716-1-0x0000000000400000-0x000000000046A000-memory.dmp modiloader_stage2 -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe" 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exepid process 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exepid process 2716 4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 3004 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4545fc10b27ce3bb20b5cf9a41cac84e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2716
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:3004