Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe
-
Size
494KB
-
MD5
ef47dc8ed4588f80c676fa26a0e437d6
-
SHA1
945c118677be48838afb958de5e06e5953ec4a7e
-
SHA256
47650245af5e31038b0c7ac5038b17a3bff8acb2b37929258ead84f55354b139
-
SHA512
cf8045c7e7e2cfb311ac563a97da20aee854d39feb4ed3f68c0a51a38dfd24b7381b1a178739fdfe2be91bdc6398ffa9e8c4058c1a7369cd48196f51f96088ec
-
SSDEEP
6144:Y6T60qmwaw40TzxiUjER7tYfHE1RSMbzfDj2Rgyz/KrzUvbljpnyA4ybq1D4+TGL:3T6XWIVc1tYfk1YU/9+bnyYbGfTg
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hccutils32.exe -
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral2/files/0x00080000000234de-4.dat modiloader_stage2 behavioral2/memory/1600-68-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-83-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-87-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-90-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-94-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-97-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-102-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-105-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-109-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-112-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-116-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-119-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-122-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-126-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 behavioral2/memory/4040-129-0x0000000000400000-0x0000000000550000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation akin.exe -
Executes dropped EXE 2 IoCs
pid Process 1600 akin.exe 4040 hccutils32.exe -
Loads dropped DLL 4 IoCs
pid Process 4040 hccutils32.exe 4040 hccutils32.exe 4040 hccutils32.exe 4040 hccutils32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA akin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hccutils32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hccutils32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\hccutils32.exe akin.exe File opened for modification C:\Windows\hccutils32.exe akin.exe File created C:\Windows\drvstore.dll hccutils32.exe File created C:\Windows\bguiv32.dll hccutils32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language akin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hccutils32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ akin.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1600 akin.exe Token: SeBackupPrivilege 3032 vssvc.exe Token: SeRestorePrivilege 3032 vssvc.exe Token: SeAuditPrivilege 3032 vssvc.exe Token: SeDebugPrivilege 4040 hccutils32.exe Token: SeDebugPrivilege 4040 hccutils32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1600 akin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4040 hccutils32.exe 4040 hccutils32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1600 1796 ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe 82 PID 1796 wrote to memory of 1600 1796 ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe 82 PID 1796 wrote to memory of 1600 1796 ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe 82 PID 1600 wrote to memory of 4040 1600 akin.exe 90 PID 1600 wrote to memory of 4040 1600 akin.exe 90 PID 1600 wrote to memory of 4040 1600 akin.exe 90 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" hccutils32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef47dc8ed4588f80c676fa26a0e437d6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\akin.exe"C:\Users\Admin\AppData\Local\akin.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\hccutils32.exe"C:\Windows\hccutils32.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4040
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3032
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51d4cd535bfb6f63430eca030b7d7a8c4
SHA14b51b492503843419e7e07c345187ff66c1d0245
SHA256f3779cd0dda7696454a401faf4a7dcaae13405aa47c2801ba4d7718d80014199
SHA51211ae8e96eb834558619b77cc0d979db8a061d19310838f705c98eb1614db20ee453f818989cbe7d1d26e472bf93ce751323c5fd97df8dd9a34ec76589cf30473
-
Filesize
33KB
MD581efa1c7bc6d23e189a4d38fe69b7b79
SHA11abb83890e5035053e072afaa1d55e491be54e78
SHA256b294a5cc711316cabc42235db1df41f8bf644af3549ee2f622c2a47d82860080
SHA51259f192544fadbb55ce9bd905cd347a0d6854faaac7b10c9868a109aa3f3cc7b8b4d736477543d3fb279dd0bfd415118c145978b26d7328709ce211bf07f99bb6
-
Filesize
7KB
MD50d7300abcdc9faa0fc7d7b07e80e9f8a
SHA10ba27c0f80f3ea4e707ea5e8a324c24053a7053b
SHA256c54a79a55e54a5ba5f65091f38c0ef1dbebc66ae704b07f94f3756a73d678e4b
SHA512b848c6a49179381182fe29f5d2c360b04baf083d3704dd1edd1c01c3cacd96cee6706659bf59ef9e657ef7dccd2f2a520232e996d9c2e09fd204d8d645041046