Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 23:52
Behavioral task
behavioral1
Sample
8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe
-
Size
195KB
-
MD5
8e1fcf2e2303870540176fad91c66b85
-
SHA1
2fabd935e7a1afef8c4fc2f24c5ee31ae30bd330
-
SHA256
09a94c80d7d0d5bcefdac4197ddf9d50d512ca5398bd5343459c04a4b8fe4bc2
-
SHA512
2895f357c53f00c8e2281ea7333fbc08ca49a832eaea244626a3d153e2a3e33cfade9e0a4f8ab4a86df3b8c0b3aa9841e8fdca09157ba9d0e616f48b2dcb0add
-
SSDEEP
3072:vsG6C5Juicvr8JTdsaE+6ORrBC6p5PpSr+OaO5IbuIc3AhaXh56sCcr9ASB7ao+a:vsGCvrMsa6UCsviAO5rY4WNcr9ASIVQJ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Processes:
mstwain32.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 16 IoCs
Processes:
resource yara_rule behavioral1/memory/2724-24-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-38-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-41-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-42-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-45-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-48-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-51-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-54-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-57-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-60-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-63-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-66-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-69-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-72-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-75-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 behavioral1/memory/2736-78-0x0000000000400000-0x0000000000477000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
Processes:
Msn Hack By C0dER x.exemstwain32.exepid Process 2724 Msn Hack By C0dER x.exe 2736 mstwain32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
mstwain32.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
Processes:
mstwain32.exeMsn Hack By C0dER x.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Msn Hack By C0dER x.exe -
Processes:
resource yara_rule behavioral1/memory/2720-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/files/0x000b000000012281-11.dat upx behavioral1/memory/2720-9-0x00000000034A0000-0x0000000003517000-memory.dmp upx behavioral1/memory/2724-17-0x0000000002270000-0x0000000002280000-memory.dmp upx behavioral1/memory/2724-24-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-25-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2720-34-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2736-38-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-41-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-42-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-45-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-48-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-51-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-54-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-57-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-60-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-63-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-66-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-69-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-72-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-75-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2736-78-0x0000000000400000-0x0000000000477000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
Processes:
mstwain32.exe8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exeMsn Hack By C0dER x.exedescription ioc Process File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe File opened for modification C:\Windows\Msn Hack By C0dER x.exe 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe File opened for modification C:\Windows\msn8.ico 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe File created C:\Windows\mstwain32.exe Msn Hack By C0dER x.exe File opened for modification C:\Windows\mstwain32.exe Msn Hack By C0dER x.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exeMsn Hack By C0dER x.exeDllHost.exemstwain32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Msn Hack By C0dER x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Msn Hack By C0dER x.exemstwain32.exeDllHost.exedescription pid Process Token: SeDebugPrivilege 2724 Msn Hack By C0dER x.exe Token: SeDebugPrivilege 2736 mstwain32.exe Token: SeDebugPrivilege 2736 mstwain32.exe Token: SeDebugPrivilege 3028 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exemstwain32.exepid Process 2720 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe 2736 mstwain32.exe 2736 mstwain32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exeMsn Hack By C0dER x.exedescription pid Process procid_target PID 2720 wrote to memory of 2724 2720 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2724 2720 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2724 2720 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2724 2720 8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2736 2724 Msn Hack By C0dER x.exe 33 PID 2724 wrote to memory of 2736 2724 Msn Hack By C0dER x.exe 33 PID 2724 wrote to memory of 2736 2724 Msn Hack By C0dER x.exe 33 PID 2724 wrote to memory of 2736 2724 Msn Hack By C0dER x.exe 33 -
System policy modification 1 TTPs 1 IoCs
Processes:
mstwain32.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e1fcf2e2303870540176fad91c66b85_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\Msn Hack By C0dER x.exe"C:\Windows\Msn Hack By C0dER x.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe" \melt "C:\Windows\Msn Hack By C0dER x.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2736
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3028
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5c2bd1dbec773b693ff3a3138012a83db
SHA1076777cf51f4907ee53d82b2e55737dbe0d764dc
SHA256e88a91820b386e88f623e7f1b7708e1240034adff7eeb25f98af53400c87ee9b
SHA51258b8d44b29619b64c284804f6f0dc73dac803ff4306ef4ebab1054a7266e5fa0a70e92b2b6affaa28ecb73465c19b43086082ba4b5ae226a9588a3e286085e31
-
Filesize
33KB
MD573789351c92759f02783bd7b64bef4b7
SHA1c355d87e64f6d560e9d5b12dc9f51e9e764f7eb2
SHA256f53c38bad50f10e298bc1b2979504877418b4075ca072c2762df9b605476345b
SHA5122ca156a0167d1e1acb45ac2ffe57d3496233751b9c9dc73ee4d030909802e9018be07dd8a341e7c88c17cc3c3930f78794919ed0f0855040cd7ba5f45c26a18e