Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe
-
Size
175KB
-
MD5
f316e64e645ac606af107feb86a26fbc
-
SHA1
6dcbc38d680242a3f1e7f2ed113e2bc788f064d5
-
SHA256
96d9a305bfb8b56b187d45d868ea552bc48b8635afd0f4df012c3f782c157340
-
SHA512
4cee00c4a34bd60b26f07c1fe1b9f1286927b780ecfd3c687599d8a09927f05c90de12e081a49e0d8856f7df6d7f86baf1fdbf1b911bde28828329fd3f35b511
-
SSDEEP
3072:g9/5ks3f5TC0nMJBx8pH1WquuF7SFyHr3xkwudrPHaSe6wi+mW+2/Ahw:gVtMWHnuESQH7xhervaK3+mWrV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral2/memory/4116-26-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4116-37-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-57-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-60-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-61-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-64-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-67-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-70-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-73-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-76-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-79-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-82-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-85-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-88-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-91-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/2228-94-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation KSP.exe -
Executes dropped EXE 2 IoCs
pid Process 4116 KSP.exe 2228 mstwain32.exe -
Loads dropped DLL 6 IoCs
pid Process 2228 mstwain32.exe 2228 mstwain32.exe 2228 mstwain32.exe 2228 mstwain32.exe 412 f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe 412 f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA KSP.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
pid Process 1132 GameBarPresenceWriter.exe -
resource yara_rule behavioral2/files/0x0008000000023480-4.dat upx behavioral2/memory/4116-8-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4116-26-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4116-37-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-57-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-60-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-61-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-64-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-67-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-70-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-73-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-76-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-79-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-82-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-85-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-88-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-91-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/2228-94-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe KSP.exe File opened for modification C:\Windows\mstwain32.exe KSP.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KSP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-945322488-2060912225-3527527000-1000\{B5C07A7B-B44F-4BAC-9498-3B9685205246} svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4116 KSP.exe Token: SeBackupPrivilege 3884 vssvc.exe Token: SeRestorePrivilege 3884 vssvc.exe Token: SeAuditPrivilege 3884 vssvc.exe Token: SeDebugPrivilege 2228 mstwain32.exe Token: SeDebugPrivilege 2228 mstwain32.exe Token: SeDebugPrivilege 412 f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4520 OpenWith.exe 2228 mstwain32.exe 2228 mstwain32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 412 wrote to memory of 4116 412 f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe 82 PID 412 wrote to memory of 4116 412 f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe 82 PID 412 wrote to memory of 4116 412 f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe 82 PID 4116 wrote to memory of 2228 4116 KSP.exe 96 PID 4116 wrote to memory of 2228 4116 KSP.exe 96 PID 4116 wrote to memory of 2228 4116 KSP.exe 96 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f316e64e645ac606af107feb86a26fbc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KSP.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KSP.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\RarSFX0\KSP.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2228
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵
- Network Service Discovery
PID:1132
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:916
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5ec6cc1fd291b219a0efb230025b7c22c
SHA1ebaeb9b51f0e71d677657b2afa83485af2294f23
SHA2566c1b0cb5d95c45f8b0e412b4aeed95fcfa5b6ee33b86fc6f47669c9d2b8cea5e
SHA512cb9d6d5678ba4653d05e82b211da4487a259733d740de27f49b081f8628f524fcbaa048d82661e17edb018a6b29f21867c8a9863611de10f9fb30a73796f16ae
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c
-
Filesize
33KB
MD57fb20cccce53f5e72db6bb9d711680a4
SHA15bdec0c3a654932afe1649386bfa32766adffdbb
SHA25644e43c1865a161b07592de987211126904a22489771c4201f99447b3c6e60602
SHA512a696fda6de6f30252f48a8064cb9b4620e29d12e0711babb717e7c28fd506751d32f99325915232018e315a70a1d305ba3f77196699d15aa5626f1e5bcd67a20
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350