Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe
-
Size
987KB
-
MD5
d54d81c094ff7ffe62c2c68acf5141a0
-
SHA1
c901d6093816c390b19e8c6bbf94ac769316eb13
-
SHA256
13741ac044bd4cf21fbfc2c45cc30725fc2f0d8b613151ba88188b2ff0b8e722
-
SHA512
dd33c5b4f5df2c654fc4599654549b1c3af4dd8b706e83d64490855a6ad309112436ae157cf9f6f5ac5b1d0eb6bd1f9e1e1095099b62d441e282e0184f7de256
-
SSDEEP
24576:a0wwuFQZfpcYRz3J/Ae1a8LrEoGPnxp1mkl:XwwiOBFjjJGPngI
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" trkk.exe -
ModiLoader Second Stage 23 IoCs
resource yara_rule behavioral1/memory/2560-30-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-26-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-24-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-22-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-20-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-18-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-31-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-35-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-36-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-37-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2560-49-0x0000000003C00000-0x0000000003F73000-memory.dmp modiloader_stage2 behavioral1/memory/2560-48-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-81-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-82-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-83-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-89-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-91-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-94-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-95-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-98-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-101-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-104-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2884-107-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 2780 trkk.exe 2884 trkk.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 2780 trkk.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA trkk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" trkk.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2032 set thread context of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2780 set thread context of 2884 2780 trkk.exe 32 -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Wplugin.dll d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe File created C:\Windows\explorer.exe.local d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe File created C:\Windows\ws2help.dll d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe File opened for modification C:\Windows\ws2help.dll d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe File created C:\Windows\Wplugin.dll d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe File created C:\Windows\Wplugin.dll trkk.exe File opened for modification C:\Windows\trkk.exe trkk.exe File created C:\Windows\ntdtcstp.dll trkk.exe File created C:\Windows\cmsetac.dll trkk.exe File created C:\Windows\trkk.exe d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe -
Hijack Execution Flow: DLL Search Order Hijacking 1 TTPs
Possible initial access via DLL redirection search order hijacking.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trkk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2560 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe Token: SeDebugPrivilege 2884 trkk.exe Token: SeDebugPrivilege 2884 trkk.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 2780 trkk.exe 2780 trkk.exe 2884 trkk.exe 2884 trkk.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2560 2032 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 30 PID 2560 wrote to memory of 2780 2560 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2780 2560 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2780 2560 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 31 PID 2560 wrote to memory of 2780 2560 d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe 31 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 PID 2780 wrote to memory of 2884 2780 trkk.exe 32 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" trkk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\d54d81c094ff7ffe62c2c68acf5141a0_JaffaCakes118.exe2⤵
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\trkk.exe"C:\Windows\trkk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\trkk.exeC:\Windows\trkk.exe4⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2884
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1DLL Search Order Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1DLL Search Order Hijacking
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
987KB
MD5d54d81c094ff7ffe62c2c68acf5141a0
SHA1c901d6093816c390b19e8c6bbf94ac769316eb13
SHA25613741ac044bd4cf21fbfc2c45cc30725fc2f0d8b613151ba88188b2ff0b8e722
SHA512dd33c5b4f5df2c654fc4599654549b1c3af4dd8b706e83d64490855a6ad309112436ae157cf9f6f5ac5b1d0eb6bd1f9e1e1095099b62d441e282e0184f7de256
-
Filesize
14B
MD5043c5cb4c1f58c7e838526b3af99f2a6
SHA1a75adf59cf125e058bb5f23d9ee2a06d2d7886fb
SHA256d96063fa43803b318cf9528bc19f003042560653dbb8f17f34f1300572b8b023
SHA512ace6f668041c04f05ade9e28bc69f2f523124a7352b0fee5ed5121c3ec0a9cb1111abbb622cb4b618b6c6be90a8a8feaf549429b2a4aee99b1294eeca3da0175
-
Filesize
108KB
MD58847a8302dacc1d6fca61f125c8fe8e0
SHA1f399142bbf03660bee1df555ebbf3acc8f658cf0
SHA2569c2726defa122089f8251fa104f76d66830f448774ab9bd634adbb6e492e3943
SHA5122b028bb4139c352b80db1509d1a3f479a8ef7e9b3b73ddbf62e2d83d4e59adf4a0bd6b9d68409bc0b6fafb7a5f56844fbfed6d00b824a6b370689801ce1c837f