Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe
-
Size
125KB
-
MD5
fc74327588ca65d3c135e84d4279b5c5
-
SHA1
40325afd5ba7249c458353bc530dee9ff01cd2a7
-
SHA256
0d694223ce29593fe84d437fa55c0ee80caee90f90fbcf8dc11990166d62f3b5
-
SHA512
97de83405d249fe9c94d99bcbb612f159b0481ebe49321ab371d5b4a308aba65593e00077dcb52eba332f7e79bd2ee99774651097e709f365d54632ed78063b4
-
SSDEEP
3072:hbPdRrApRSifHak/NbutbfKTT14ZXjxC56Q0aKPLI4IaBl1wW:Pk/UrKTTKZtC56Q0zLI5aBP
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 16 IoCs
resource yara_rule behavioral1/memory/3000-23-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-32-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-35-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-36-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-39-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-42-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-45-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-48-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-51-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-54-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-57-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-60-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-63-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-66-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-69-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2916-72-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 3000 explore.exe 2916 mstwain32.exe -
Loads dropped DLL 1 IoCs
pid Process 3000 explore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explore.exe -
resource yara_rule behavioral1/files/0x0008000000015f4d-10.dat upx behavioral1/memory/3000-11-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-26-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/3000-23-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-32-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-35-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-36-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-39-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-42-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-45-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-48-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-51-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-54-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-57-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-60-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-63-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-66-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-69-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2916-72-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe explore.exe File opened for modification C:\Windows\mstwain32.exe explore.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3000 explore.exe Token: SeDebugPrivilege 2916 mstwain32.exe Token: SeDebugPrivilege 2916 mstwain32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 mstwain32.exe 2916 mstwain32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1080 wrote to memory of 3000 1080 fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe 30 PID 1080 wrote to memory of 3000 1080 fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe 30 PID 1080 wrote to memory of 3000 1080 fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe 30 PID 1080 wrote to memory of 3000 1080 fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2916 3000 explore.exe 31 PID 3000 wrote to memory of 2916 3000 explore.exe 31 PID 3000 wrote to memory of 2916 3000 explore.exe 31 PID 3000 wrote to memory of 2916 3000 explore.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc74327588ca65d3c135e84d4279b5c5_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\explore.exe"C:\Users\Admin\AppData\Local\Temp\explore.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\explore.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD58569f38f95909f280c4c76ddfe543c0b
SHA16877e57c3f5fbf1673fbebf68b9e87786a3f0d74
SHA256499b14fcf1993280275aaf88d857fc8b9e408a7225a83a5584379595eec92308
SHA5120abfadd4c981f6697f43cacf7a27deec24e5a90929cf25f0bfb188ddb6533f823b44f3eb71192214542175fc5a483df19556c1f78c668485cbe147d6e50d9918