Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 13:29
Behavioral task
behavioral1
Sample
cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe
-
Size
270KB
-
MD5
cce4b0bc4b6262a2da88040db894e7a5
-
SHA1
fa8f6d0f0b7128e27b7cbd050af70b30e22ff453
-
SHA256
11a769568692bad35094efbb3219542fec7ae55d7e92a7b98a52fb56123bae46
-
SHA512
26f837b86ff1dd33961fce275f111b6ca52245d4b9ca57bdd2c1f62aa83a3ff80ce8a199028bac3f9baf8509c9fbc831dc4b8126c5f18884e8c10a482649e5dd
-
SSDEEP
6144:qGyjnBSkuV1d4eZd88ORJIf/wTB4R53Eupc:5YnBSkuVUeZdYqwTK
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe -
ModiLoader Second Stage 14 IoCs
resource yara_rule behavioral2/memory/2672-15-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-18-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-21-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-24-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-27-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-30-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-33-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-36-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-39-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-42-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-45-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-48-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-51-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2672-54-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Loads dropped DLL 4 IoCs
pid Process 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe Token: SeDebugPrivilege 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe 2672 cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cce4b0bc4b6262a2da88040db894e7a5_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2672
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD50428c6b1f342f50a3914165b0fb5458e
SHA143d9794abafcb0e22476ffb839dde7ba742be9b0
SHA256e611c61aeaef32fe2081afd56a2f03f81c41a605f9e8726a04014998976284d9
SHA512d8f6f3435b8137141b05916c8870e68340c25600dd9bff34b96831cf1a197eabc876ed7d0ca5d2ecaac8a1cf025396796897e596b022ad1d69d713d2413c5df2
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350