Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 22:54

General

  • Target

    97abbf0b1ef33c7106388d4778bb1c48_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    97abbf0b1ef33c7106388d4778bb1c48

  • SHA1

    43c0d70f6d9f1b245b9d6d7d8900efd0efb9095a

  • SHA256

    e348b57dade9e6b807052d51062a964fc9be6caa3425587125f7c8a796715858

  • SHA512

    e976969329859638a46c87157e922740b4266a7d1ff535ca3978945e9a15b6288bb670df0f96c703199e5e4ef2718299133c499fb9f2e8d0d95cb5a78085d2df

  • SSDEEP

    24576:QyZBTGF2mygtszkp3TXh5r9RzEws3BNjSYAHb8erClz1MaUevrX/6Q7X6ezrRnmf:BvG7szk3rZVY3H27mRfrXd4ZQe1z+q

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 17 IoCs
  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 5 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\97abbf0b1ef33c7106388d4778bb1c48_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\97abbf0b1ef33c7106388d4778bb1c48_JaffaCakes118.exe"
    1⤵
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\turko.exe
      "C:\Users\Admin\AppData\Local\Temp\turko.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Windows\ctfmom.exe
        "C:\Windows\ctfmom.exe" \melt "C:\Users\Admin\AppData\Local\Temp\turko.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2460
    • C:\Users\Admin\AppData\Local\Temp\ducsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\ducsetup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2568
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\turko.exe

    Filesize

    112KB

    MD5

    5541eeec419ade4d4e8cc760f2bd144b

    SHA1

    a5263e4de342da4658fed98844e7dd5a69f9b4ee

    SHA256

    2192508bb8e9e0c4a759777bd5115b93500ee3a74fee458cfa5898629d50c576

    SHA512

    2421a4b16841d133fe78a51eb093bddfa3bc9751d651dceaddfd874652d35621ff6fa38c52399a55939a3ae80680ee9718e24e430edce7752ea5186fdb54d1e8

  • C:\Windows\cmsetac.dll

    Filesize

    33KB

    MD5

    8c96a09c3fe09e4a948d8240d313e227

    SHA1

    9f92327e675f9c14abb62f072a53593c1a69d053

    SHA256

    bcbcfed7837c29f63ec637e898a94d1b8fdf7a6e406bce55d30d578797dacbc4

    SHA512

    e6ba96ab77704db3fbfd655b4b3c3284d39a4aa703e882d5832f3c8e562476906c2a33229d2a4ec1ca2b8e3a4bc0a0ef95c3d951b2a297d7e69f5b4445ac2648

  • \Users\Admin\AppData\Local\Temp\ducsetup.exe

    Filesize

    1.1MB

    MD5

    1572340c8226f3fa6e7fb66e0c32d3b8

    SHA1

    499f9f39ed540959c959e8c18f4e2411d6fc24d6

    SHA256

    c592963191a06cf6a88f7375f3424d6bb94d21990a34074c2d7b7a7ce28cc8eb

    SHA512

    2469042806bdd91c2f04bc45e1fe0b36f3ad719f409d55bacbc496264a34fb70cced9ce73f8c63b3028ebc992f542ceff392711fb2a8f26b941468a80846154c

  • \Users\Admin\AppData\Local\Temp\nsj2F8B.tmp\StartMenu.dll

    Filesize

    7KB

    MD5

    4e96f412a8cc653053d5d918df6b0836

    SHA1

    a3c7d59043feecb1603874b27c23d4166b341f2d

    SHA256

    e4a54bfc327986a89165bdef361069810aaa985c3abecd442c786725fabaf977

    SHA512

    2fec61b4ad31250bdbdbbfd551d831801790b96902c67200661e8f4f2753378bbf6c0c88b12e1be9173a29597827c1c4809511b6d52666dc3324bd7031c8229d

  • memory/2460-85-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-76-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-97-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-93-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-105-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-89-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-57-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-81-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-45-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-101-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-72-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-68-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-49-0x0000000001E20000-0x0000000001E2E000-memory.dmp

    Filesize

    56KB

  • memory/2460-109-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-64-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-113-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2460-56-0x0000000001E20000-0x0000000001E2E000-memory.dmp

    Filesize

    56KB

  • memory/2460-55-0x0000000000280000-0x0000000000288000-memory.dmp

    Filesize

    32KB

  • memory/2460-54-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2568-52-0x00000000005F0000-0x00000000005FE000-memory.dmp

    Filesize

    56KB

  • memory/2568-53-0x00000000005F0000-0x00000000005FE000-memory.dmp

    Filesize

    56KB

  • memory/2592-34-0x0000000002D70000-0x0000000002D80000-memory.dmp

    Filesize

    64KB

  • memory/2592-40-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2592-41-0x0000000002FF0000-0x0000000003040000-memory.dmp

    Filesize

    320KB

  • memory/2592-44-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2592-36-0x0000000002FF0000-0x0000000003040000-memory.dmp

    Filesize

    320KB

  • memory/2592-18-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2676-0-0x0000000000400000-0x000000000056F000-memory.dmp

    Filesize

    1.4MB

  • memory/2676-24-0x0000000000400000-0x000000000056F000-memory.dmp

    Filesize

    1.4MB

  • memory/2676-17-0x00000000059D0000-0x0000000005A20000-memory.dmp

    Filesize

    320KB

  • memory/2676-19-0x00000000059D0000-0x0000000005A20000-memory.dmp

    Filesize

    320KB

  • memory/2676-6-0x0000000000400000-0x000000000056F000-memory.dmp

    Filesize

    1.4MB

  • memory/2676-4-0x0000000000400000-0x000000000056F000-memory.dmp

    Filesize

    1.4MB

  • memory/2676-1-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB