Analysis
-
max time kernel
142s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 06:55
Behavioral task
behavioral1
Sample
5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe
-
Size
785KB
-
MD5
5ae3cafa3421ea2fb73b1648e20e5597
-
SHA1
65e7f9b3e7456b9f525eb99d6b23a4713c27f22d
-
SHA256
350b3401252bc6dda2c95606516ea43bdf08a54513e5cec21e55ded632e8b73b
-
SHA512
003b5a7305b8311fe81305d057a255f7b3cc6caee29adf5bf0beeaed1114a4d1ad373b1bdb8b581369768a97e0114b5e8a5c8b7f4705c8f8dcee7b7f66be5281
-
SSDEEP
12288:u8/iRtoxzCImiq4LSnziWHs5RFmO6lQOzEme4yV7rjmlXWAK5gWyMwYncq3g93i:uSC2xzCeSqrzgTz2vVPjml5n8ND3g9y
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
ModiLoader Second Stage 25 IoCs
resource yara_rule behavioral1/memory/2180-2-0x0000000000401000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral1/memory/2180-3-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-4-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-9-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-14-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-15-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-16-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-17-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-18-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-21-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-22-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-23-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-24-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-27-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-28-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-31-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-34-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-38-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-41-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-44-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-47-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-50-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-53-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-56-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 behavioral1/memory/2180-59-0x0000000000400000-0x00000000005A2B00-memory.dmp modiloader_stage2 -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Wine 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-1-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-3-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-4-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-9-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-14-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-15-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-16-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-17-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-18-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-21-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-22-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-23-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-24-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-27-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-28-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-31-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-34-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-38-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-41-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-44-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-47-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-50-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-53-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-56-0x0000000000400000-0x00000000005A2B00-memory.dmp themida behavioral1/memory/2180-59-0x0000000000400000-0x00000000005A2B00-memory.dmp themida -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe Token: SeBackupPrivilege 2680 vssvc.exe Token: SeRestorePrivilege 2680 vssvc.exe Token: SeAuditPrivilege 2680 vssvc.exe Token: SeDebugPrivilege 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe 2180 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5ae3cafa3421ea2fb73b1648e20e5597_JaffaCakes118.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2180
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2680
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5225ffa77917031a41828c75340ab35d4
SHA12dcb6f42aeed35213b0674ed4e95f8c31bb48075
SHA2565e4ea05c862d681cea705afc8a6bfd15d9defa41696f4c3fc93302f9d421ea08
SHA51206a3c412a92411c0d7e94562e6f66035fd0a4e41d4165b3853b72e98cc9bed43e078884fffc8dc694aeb0de71c740798bda68b50f0ef9e715c97c2013ea25be0
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350