Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 00:51
Static task
static1
Behavioral task
behavioral1
Sample
91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe
-
Size
890KB
-
MD5
91a31aed2f492af595b5170ffeee760c
-
SHA1
094b8c49418272737243bfc0380753c4adf177f8
-
SHA256
0e3d6b0ac9cd4699c8c98929306b2679026e4add1cad2eb9ca4a542030e395e5
-
SHA512
55a293dfe9dd768868ca0c0e3f2f8ec2bba9119f7372d3f8ca67e071d8149334713c37e4957347e118d01f9dea31b288d71252530897360c40d0caeba40ad841
-
SSDEEP
24576:pwQOryEvO+LpFthUQQymLrs8w13VLospnN115qQtm:pljQphDNmLrPw3senN115qIm
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ctfmon.exe -
ModiLoader Second Stage 21 IoCs
resource yara_rule behavioral2/memory/4612-9-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-10-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-11-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-12-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/4612-25-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-40-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-41-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-46-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-47-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-48-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-49-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-50-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-51-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-52-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-53-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-54-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-55-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-56-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-57-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-58-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3048-59-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3888 ctfmon.exe 3048 ctfmon.exe -
Loads dropped DLL 3 IoCs
pid Process 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 3888 ctfmon.exe 3048 ctfmon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CTFMON = "C:\\Windows\\ctfmon.exe" ctfmon.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ctfmon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ctfmon.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EtNDuISBB.dll ctfmon.exe File created C:\Windows\SysWOW64\EtNDuISBB.dll 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\EtNDuISBB.dll 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1196 set thread context of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 3888 set thread context of 3048 3888 ctfmon.exe 91 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\ctfmon.exe ctfmon.exe File created C:\Windows\ntdtcstp.dll ctfmon.exe File created C:\Windows\ctfmon.exe 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe File opened for modification C:\Windows\ctfmon.exe 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4612 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe Token: SeBackupPrivilege 1636 vssvc.exe Token: SeRestorePrivilege 1636 vssvc.exe Token: SeAuditPrivilege 1636 vssvc.exe Token: SeDebugPrivilege 3048 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 3888 ctfmon.exe 3888 ctfmon.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 1196 wrote to memory of 4612 1196 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 82 PID 4612 wrote to memory of 3888 4612 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 90 PID 4612 wrote to memory of 3888 4612 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 90 PID 4612 wrote to memory of 3888 4612 91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe 90 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 PID 3888 wrote to memory of 3048 3888 ctfmon.exe 91 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ctfmon.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe2⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\ctfmon.exe"C:\Windows\ctfmon.exe" \melt "C:\Users\Admin\AppData\Local\Temp\91a31aed2f492af595b5170ffeee760c_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\ctfmon.exeC:\Windows\ctfmon.exe4⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3048
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
890KB
MD591a31aed2f492af595b5170ffeee760c
SHA1094b8c49418272737243bfc0380753c4adf177f8
SHA2560e3d6b0ac9cd4699c8c98929306b2679026e4add1cad2eb9ca4a542030e395e5
SHA51255a293dfe9dd768868ca0c0e3f2f8ec2bba9119f7372d3f8ca67e071d8149334713c37e4957347e118d01f9dea31b288d71252530897360c40d0caeba40ad841
-
Filesize
40KB
MD53f689ab34ba20ffbc647f3c4ce7c9c92
SHA10275be6c5d43a4916f4b6b2b4aa06398e193206f
SHA256003eb1ba56dc99c6a6d4e8f35233edcee64aa8001ac5f7289369cae2325ff019
SHA5125336b3d410c21746a81a67c1b0da791d5592d4dc42fe559bc9b12a89b6bc6aef04b385a1566e55a7599c2489741ee7b0953f9cb0b3b5b9a9feb006678e2bdbce
-
Filesize
14B
MD5faf41fe287d0c7c7f451c6caa86d66c6
SHA1e374f4ed95915bf79837897243d16e28cf9e23a7
SHA256045bd169830420c710d4d51d59414530ee6d178e5b0fbe11a40ed6dfae142bc1
SHA5124ffb371ed75da223bc5dbcda167fd083cc09272b271dfae8ff38312c83d118b5c7e9ad21fb0ba2a7250207481403fd33a362c4ecb40b74d67cd64d4371c4c6d6