Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe
-
Size
194KB
-
MD5
9efa4c0e78d0b1096ae3510efd5231cf
-
SHA1
4a471137e0ac50c3887453825f0ddc613055d923
-
SHA256
e4f416f78fcc2a838d7ed57234a74a49155b0404dbe9848def287c41cfdbb32d
-
SHA512
3b3de79449db98ef08c1f51157755ab2cdd749665cdcfea47aec12a783538a595bc4b8ec6146da90a9496217809b1ca42af07f3cd52453b28ad158d3195b2ffc
-
SSDEEP
3072:lwL7p1+MJKrUnFYY5z1i0Nmbi5fJBN95DIp8outV:lwIrPj0NmWtN/UKoSV
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
Processes:
0.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0.EXE -
ModiLoader Second Stage 15 IoCs
Processes:
resource yara_rule behavioral1/memory/2392-18-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-20-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-23-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-26-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-29-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-32-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-35-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-38-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-41-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-44-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-47-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-50-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-53-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-56-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral1/memory/2392-59-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
0.EXEpid process 2392 0.EXE -
Processes:
0.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0.EXE -
Processes:
resource yara_rule C:\0.EXE upx behavioral1/memory/2392-8-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-16-0x0000000076360000-0x0000000076450000-memory.dmp upx behavioral1/memory/2392-18-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-20-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-23-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-26-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-29-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-32-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-35-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-38-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-41-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-44-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-47-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-50-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-53-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-56-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral1/memory/2392-59-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe0.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0.EXEdescription pid process Token: SeDebugPrivilege 2392 0.EXE Token: SeDebugPrivilege 2392 0.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0.EXEpid process 2392 0.EXE 2392 0.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exedescription pid process target process PID 1096 wrote to memory of 2392 1096 9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe 0.EXE PID 1096 wrote to memory of 2392 1096 9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe 0.EXE PID 1096 wrote to memory of 2392 1096 9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe 0.EXE PID 1096 wrote to memory of 2392 1096 9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe 0.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
0.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9efa4c0e78d0b1096ae3510efd5231cf_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\0.EXE"C:\0.EXE"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD55bada2e0127456d98cec26c5d59f8d20
SHA119d7040da7a6fbe7458fff851e263bdb36f05bd6
SHA256cda73e3cf3666c75273f3e5bece5001e9ccdcec0675341144298ebb2e8e16f47
SHA5128f978b552610c819d9d5ccab59c9f65d43f60597961dc6cd582e6101dbb618350ec53f16cadf09d00ab5d05126886410c20a9a0da52b8600cd79d4eea45fef38