Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 03:55
Behavioral task
behavioral1
Sample
3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe
-
Size
108KB
-
MD5
3335346cf5a5c406e325adcaeb35ed62
-
SHA1
2fd4f376698736bccc869411bf4183c13c8b7f53
-
SHA256
3b67bae7dea91fad2b904a1d015ea53f98cc4d8fad13cfc81cf2a389a78a5d1b
-
SHA512
6d2b4e335e4ef1aec68edc09daf52c2548a367f6b6bf75813b9d8a9152aa29074acb8ddd7e8ae25e0d512f888394701d877c85256022df4898733fb5682cad47
-
SSDEEP
3072:soy8j7VnNdrPHaSekwi+mW+2QPkTUpkout:c8jZ7rvaU3+mWrQ+UCoS
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral1/memory/2316-2-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2316-6-0x0000000002340000-0x0000000002350000-memory.dmp modiloader_stage2 behavioral1/memory/2316-14-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-25-0x0000000074EE0000-0x0000000074FD0000-memory.dmp modiloader_stage2 behavioral1/memory/1876-26-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-29-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-30-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-34-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-38-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-42-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-45-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-48-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-51-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-54-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-57-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-60-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-63-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/1876-66-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 1876 mstwain32.exe -
Executes dropped EXE 1 IoCs
pid Process 1876 mstwain32.exe -
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2316-2-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/files/0x00060000000055cf-8.dat upx behavioral1/memory/1876-17-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2316-14-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-25-0x0000000074EE0000-0x0000000074FD0000-memory.dmp upx behavioral1/memory/1876-26-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-29-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-30-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-34-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-38-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-42-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-45-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-48-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-51-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-54-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-57-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-60-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-63-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/1876-66-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mstwain32.exe 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe File created C:\Windows\mstwain32.exe 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2316 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe Token: SeBackupPrivilege 2176 vssvc.exe Token: SeRestorePrivilege 2176 vssvc.exe Token: SeAuditPrivilege 2176 vssvc.exe Token: SeDebugPrivilege 1876 mstwain32.exe Token: SeDebugPrivilege 1876 mstwain32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1876 mstwain32.exe 1876 mstwain32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1876 2316 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1876 2316 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1876 2316 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe 33 PID 2316 wrote to memory of 1876 2316 3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe 33 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\3335346cf5a5c406e325adcaeb35ed62_JaffaCakes118.exe"2⤵
- UAC bypass
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1876
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2176
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD53335346cf5a5c406e325adcaeb35ed62
SHA12fd4f376698736bccc869411bf4183c13c8b7f53
SHA2563b67bae7dea91fad2b904a1d015ea53f98cc4d8fad13cfc81cf2a389a78a5d1b
SHA5126d2b4e335e4ef1aec68edc09daf52c2548a367f6b6bf75813b9d8a9152aa29074acb8ddd7e8ae25e0d512f888394701d877c85256022df4898733fb5682cad47