Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 02:53
Behavioral task
behavioral1
Sample
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe
-
Size
270KB
-
MD5
0232a4455c6f6aafcd2ba32cdc5ff88d
-
SHA1
15311cc7bc79f4d30a419d12b73b7e4ac6747a19
-
SHA256
e7911a67fb298be3497753989853d237fe3878c5ce08ac348ab296f50ff728ee
-
SHA512
d90e4532fcae0220ca3b23fab75e6e4baf77b2c03174c19496cf7754d4256464610b08e32c61e63d195d211e284c7850d7a8c464032a5d8dbed88df8726defa1
-
SSDEEP
6144:jG877xS21+Wi+io1XWwTBAWx4v5xBpcipJvHx:S27xS21+aswTSCO7pJvHx
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Processes:
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe -
ModiLoader Second Stage 14 IoCs
Processes:
resource yara_rule behavioral2/memory/216-15-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-18-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-21-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-24-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-27-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-30-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-33-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-36-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-39-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-42-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-45-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-48-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-51-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/216-54-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Loads dropped DLL 4 IoCs
Processes:
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exepid process 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe" 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe -
Processes:
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe Token: SeDebugPrivilege 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exepid process 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe 216 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0232a4455c6f6aafcd2ba32cdc5ff88d_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cmsetac.dlLFilesize
33KB
MD5d5788d6c79a80195d8697b660982500e
SHA16265c445bd3831418b33a739ce8e40103384123e
SHA256b427bf2fed570068eb175b81573c64e8f760bee6074012794f1d3dddd6ae5b53
SHA512a9efcb012bc8aee73d54afa19a9d5f205bdadf561d12a97ac7364f2b8d78197bb011691d8aa60159be812a9ddd15c123e39f31ab1a82220aa9916d4fa06954a8
-
C:\Users\Admin\AppData\Local\Temp\ntdtcstp.dLlFilesize
7KB
MD55711405e2cd266ccb4a4938ec260e1dc
SHA1ede02b4ccdce48702216f3e8c598740ae65f91f0
SHA2564d100edcbf80bff8570ae37ab56e932b38f01432f3334449aadc9203c7b7d065
SHA512ec98f21c83b6be460d9dc02d275c4ab673380329d57c811be034d68c9389c690ae31657dc531af682f3f4df5106589ca00f162d2ccf06c81b3657f8319bc71c9
-
memory/216-24-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-27-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-14-0x0000000002F50000-0x0000000002F51000-memory.dmpFilesize
4KB
-
memory/216-15-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-17-0x00000000030A0000-0x00000000030AE000-memory.dmpFilesize
56KB
-
memory/216-16-0x0000000000930000-0x0000000000938000-memory.dmpFilesize
32KB
-
memory/216-18-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-21-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-7-0x00000000008E0000-0x00000000008E1000-memory.dmpFilesize
4KB
-
memory/216-11-0x00000000030A0000-0x00000000030AE000-memory.dmpFilesize
56KB
-
memory/216-30-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-33-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-36-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-39-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-42-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-45-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-48-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-51-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/216-54-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB