Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    19-06-2024 19:10

General

  • Target

    001c6d7420b934f508dca238a1ea5d50_JaffaCakes118.exe

  • Size

    707KB

  • MD5

    001c6d7420b934f508dca238a1ea5d50

  • SHA1

    334186eea5b001db47a4d74585e183d0e2bfc172

  • SHA256

    7e25b1d62c05e19a84ac7716328bc5f5bbe2130272f97a91e559f96f8c0db5d7

  • SHA512

    823470676f234c7f8c45ac38f525aa7cbbebdeba527cd0c68bff2cf3a4ff6c6c4bb5d721523708e3204c6d1a83e099c830e8ebf192873936d21235a9c10acf0a

  • SSDEEP

    12288:TlZ1tcMdlOfLVtok/6t9hfYoarivgTKyCpcU3pIvBJMD2nvhDTGb2lUPwWPR9w5l:5OMjOp/6t9hA5ZTDmcJZJJvG2eYWb

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\001c6d7420b934f508dca238a1ea5d50_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\001c6d7420b934f508dca238a1ea5d50_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:1200

Network

MITRE ATT&CK Matrix ATT&CK v13

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\cmsetac.dll
    Filesize

    33KB

    MD5

    f8df74581528a50080e53ea0335d375b

    SHA1

    04bb0229ce37d3369418c0057f52d086f669d61c

    SHA256

    4f71a5f1bf96385041f803ffa0a3a353d6a61200a3f36304ffa6f8bbf91c7ed6

    SHA512

    9167f929db3dc5061b95100e41ffcef0ed7cd87746c4d6b6da2f56c0edf4299702a9ad3447c1e1fb07407f00e6cc54d1e747ce866f4f96f399f71cefba45fb3c

  • \Users\Admin\AppData\Local\Temp\ntdtcstp.dll
    Filesize

    7KB

    MD5

    67587e25a971a141628d7f07bd40ffa0

    SHA1

    76fcd014539a3bb247cc0b761225f68bd6055f6b

    SHA256

    e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378

    SHA512

    6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

  • memory/1200-17-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-11-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-21-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-9-0x0000000004E10000-0x0000000004E1E000-memory.dmp
    Filesize

    56KB

  • memory/1200-22-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-12-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-15-0x0000000004E10000-0x0000000004E1E000-memory.dmp
    Filesize

    56KB

  • memory/1200-25-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-13-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-16-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-0-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-18-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-1-0x0000000000401000-0x000000000041C000-memory.dmp
    Filesize

    108KB

  • memory/1200-3-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-14-0x0000000003B60000-0x0000000003B68000-memory.dmp
    Filesize

    32KB

  • memory/1200-28-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-31-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-34-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-37-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-40-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-43-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-46-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-49-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-52-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB

  • memory/1200-55-0x0000000000400000-0x00000000004DC000-memory.dmp
    Filesize

    880KB