Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
dda7edce12b4124dd7be6faf2843aea4
-
SHA1
a0f074733daa9e5715edd823186629ac3dd965b0
-
SHA256
f2311764e12c512800409cc377a36af427a6a3359476433e4762cc677209d9ef
-
SHA512
bf8b027719de6bda6b7416c45a9134bbbd4f8aca1e78c4b10c64c574d506589e75460199c5e7e4d4063eafe9ad0efdb0e083b90eefab2a3d220dddfba15a50d3
-
SSDEEP
24576:3cEqeoirXtjsFYCgVVtsFMQG/xkz0UuIViDY8Dy7uI7fQXIWoLm2I0dyV+oBMiXI:3cEqePV3e9C3HoC5JvY7j8mJhySlT
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
ModiLoader Second Stage 22 IoCs
resource yara_rule behavioral1/memory/2916-0-0x0000000000401000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral1/memory/2916-5-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-9-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-10-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-11-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-12-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-15-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-16-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-17-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-18-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-21-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-24-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-27-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-31-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-34-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-37-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-40-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-43-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-46-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-49-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-52-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 behavioral1/memory/2916-55-0x0000000000400000-0x00000000005C0000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 2916 dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe 2916 dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe" dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2916 dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe Token: SeBackupPrivilege 540 vssvc.exe Token: SeRestorePrivilege 540 vssvc.exe Token: SeAuditPrivilege 540 vssvc.exe Token: SeDebugPrivilege 2916 dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe 2916 dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dda7edce12b4124dd7be6faf2843aea4_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2916
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:540
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD57a8a49c76180f8a5bcde18bccdcf05af
SHA1d2d7382aaceae82d2b261f1093f67f3186224590
SHA256d6e7a916240da9bd13f9e2039723dd3b228bc75515c865afc037b43350eda6ae
SHA512b6dd3846d38b00c1bb26e767ac802007b5b8503d25387d1adb31050f0d3f5e663c3655f1913d28a80b66e3be9da64ba165ae4a40ca33096f016b73152b3af513
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350