Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 05:24
Behavioral task
behavioral1
Sample
f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
f15c1e96f902e16e171b14623835cf07
-
SHA1
13be5000fd6e2f0accfb51372d65830c5dee454a
-
SHA256
01fee8c117a98181f1308fc8cde7baeeb9e74975ae59d4c1208ae033d4f06818
-
SHA512
5cc8e399bd7aa3c9989152c6e0a1a4e21476fa1a5e248f10c2285628fb9aac11084a82f32ba52e40922f3cc47cead02193d59fbbc7ef4ab993f212b051c0a317
-
SSDEEP
24576:dsr2gVyCGDQJ4b4d51CwL0B+NwZokqrqvm13na2Waf/mbXbs3aEq:OJ/d5/gkNAokqr713nHWaf/mIaEq
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe -
ModiLoader Second Stage 23 IoCs
resource yara_rule behavioral1/memory/2168-2-0x0000000000401000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral1/memory/2168-5-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-12-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-8-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-13-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-14-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-16-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-17-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-18-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-21-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-22-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-25-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-28-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-31-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-34-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-37-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-40-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-43-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-46-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-49-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-52-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-55-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 behavioral1/memory/2168-58-0x0000000000400000-0x00000000006AC000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 2168 f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe 2168 f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2168-5-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-12-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-8-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-13-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-14-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-16-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-17-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-18-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-21-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-22-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-25-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-28-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-31-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-34-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-37-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-40-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-43-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-46-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-49-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-52-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-55-0x0000000000400000-0x00000000006AC000-memory.dmp themida behavioral1/memory/2168-58-0x0000000000400000-0x00000000006AC000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2168 f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2168 f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe Token: SeDebugPrivilege 2168 f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe 2168 f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f15c1e96f902e16e171b14623835cf07_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2168
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD54d770d1b8709fa4892dea04979a6f06f
SHA172907fb96122337dadbb11f4c906db77d2ca82d4
SHA25666d18a70288867b9ad479b25c89f6bf9870cf4523bd08618ad9b66d6e9ea0659
SHA512eaa8009f7a8771bdc59e5aaff53acae6b1f735a51d1627f0dbeea65b399404ae49327a7a42e92448ea4839df935aea86ffdf924f6bc8f774835cc873e7409d40
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350