Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
91130fda12cbba9fa77c1e35c3a417e6
-
SHA1
03b93bdc05a1bf2c3fc8d9286ffebc59eb9706fd
-
SHA256
63e08c8dde091cdc8bae5ce8b4be2a61f0eaa2d49e928ea0e37efe0c6c4b61a9
-
SHA512
89e9c5e31d9d7bc667d26a0f40b4b57a94498812451dab9621f550ff5cddc0f5b13acacc627b2fc7c5c2f0ae32184a8b9ee40fcc81e762592b14b8a9d7c5bde4
-
SSDEEP
49152:j/g72Lgv7JzvP0gmnXf5VASG38e8AGQ3G:7g72kJD+v56SGse1
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 12 IoCs
resource yara_rule behavioral2/memory/1180-37-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-66-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-67-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-73-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-79-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-85-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-91-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-97-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-103-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-109-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-115-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/4876-121-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation server.exe -
Executes dropped EXE 4 IoCs
pid Process 1180 server.exe 1668 Turkojan4.exe 1748 Turkojan4.tmp 4876 mstwain32.exe -
Loads dropped DLL 6 IoCs
pid Process 4876 mstwain32.exe 4876 mstwain32.exe 4876 mstwain32.exe 4876 mstwain32.exe 1748 Turkojan4.tmp 1748 Turkojan4.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" mstwain32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA server.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
resource yara_rule behavioral2/files/0x0008000000023ca4-4.dat upx behavioral2/memory/1180-16-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1180-37-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-66-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-67-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-73-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-79-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-85-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-91-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-97-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-103-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-109-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-115-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/4876-121-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe server.exe File opened for modification C:\Windows\mstwain32.exe server.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Turkojan4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Turkojan4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1180 server.exe Token: SeBackupPrivilege 2724 vssvc.exe Token: SeRestorePrivilege 2724 vssvc.exe Token: SeAuditPrivilege 2724 vssvc.exe Token: SeDebugPrivilege 4876 mstwain32.exe Token: SeDebugPrivilege 4876 mstwain32.exe Token: SeDebugPrivilege 1748 Turkojan4.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4876 mstwain32.exe 4876 mstwain32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1180 3128 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe 83 PID 3128 wrote to memory of 1180 3128 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe 83 PID 3128 wrote to memory of 1180 3128 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe 83 PID 3128 wrote to memory of 1668 3128 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe 84 PID 3128 wrote to memory of 1668 3128 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe 84 PID 3128 wrote to memory of 1668 3128 91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe 84 PID 1668 wrote to memory of 1748 1668 Turkojan4.exe 85 PID 1668 wrote to memory of 1748 1668 Turkojan4.exe 85 PID 1668 wrote to memory of 1748 1668 Turkojan4.exe 85 PID 1180 wrote to memory of 4876 1180 server.exe 94 PID 1180 wrote to memory of 4876 1180 server.exe 94 PID 1180 wrote to memory of 4876 1180 server.exe 94 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91130fda12cbba9fa77c1e35c3a417e6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Turkojan4.exe"C:\Users\Admin\AppData\Local\Temp\Turkojan4.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\is-KPIOR.tmp\Turkojan4.tmp"C:\Users\Admin\AppData\Local\Temp\is-KPIOR.tmp\Turkojan4.tmp" /SL5="$700D8,1651681,53248,C:\Users\Admin\AppData\Local\Temp\Turkojan4.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2724
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5617337edd98cfa83021a6d7d4cbbeb26
SHA1600fa4967e6a628472ccfd89092e7bd4d9f2d13c
SHA25628eecbe13b59281d6a668fc4c6a907a7fcfd8afdcd68a9467e9a816371933830
SHA5120d0bb6a826878ff5f14a8c370239486abbce35618635d2f3a89647eb5ea5f05c4c2b2bcc4dcd4fb307b948cbadb437cf08725b63e5d13f4be6b217333f1060f7
-
Filesize
665KB
MD59e30ab5e3f6b43f69f928e6b4fcfd604
SHA1b110f04114c52f2439715cbad3769250dbcdb1b3
SHA256affbe7f0320f9602d8c51468ecb7bc7960df4f62ab1a36c05ac2fe2816d175ba
SHA5128d751d8c8023bbd54ea2ea0969ad9f379d8bf1066980fdd58007e778bdf654e4e13264ac8917be91ac8583ea9ae5536ca600530f413cbd887c234ec60be5a45d
-
Filesize
111KB
MD57c7e500362ed2a6a20abc40e565baea2
SHA142ab907b94f98c11e9b0f150899845b67197b873
SHA256de023f8782c8fc60f0655429929d3a4145961736f4aaa08a7880e64244970063
SHA512c8a4c407061d0b859a9e5e39bfd0e2b841e048f6453a2680aa5b1fdb8bcd529d79149cb9010c2dc480d42f64e975b08a6b48171bbdc8f82e79f647f7f89315c7
-
Filesize
33KB
MD5d2b20db3f5352befbf6d2a38f3dd8d5c
SHA125cdc577ac81bca03def5b34916d4ffd81444604
SHA256ef61b13e879b9ddacff5a073a53640b485951931fc68c6399fa6ffacaa91c5f6
SHA512474a35c11a80f6bfb3718a520b89f8d747f4ac1e0ca9bda66c34a0692e08d8e0d4841c1931035faa4ccebc14fa26dac660331278d4a0696b59d8704092771435
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350