Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 08:01
Behavioral task
behavioral1
Sample
afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe
-
Size
812KB
-
MD5
afe8bbef79fe01712c2b222912fc0ec8
-
SHA1
ba735e6136f9426f26b5389b4453daffff3cebbe
-
SHA256
86f9db5c9f8414ca8f22bbf875e70914c832d800353159fde15e458c32520c52
-
SHA512
1baad7683d653e9515422202a6d34a872c6d7a0e15cace2384c2f35118643fc9701c2ff98c1e997518bf71130d702397f7a81a3d537408aed9a2065b26652d43
-
SSDEEP
12288:fr7xS2Vp6RwTyCHbJJvHZKreJncWDUkayDm5OcALw2xkcHCpjYP0MeTPDFiqkkad:BS2Vp6RwTVJvHVSWDRDz50YQAmPDy1U6
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe -
ModiLoader Second Stage 14 IoCs
resource yara_rule behavioral1/memory/2396-11-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-14-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-17-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-20-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-23-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-26-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-29-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-32-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-35-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-38-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-41-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-44-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-47-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2396-50-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 2396 afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe 2396 afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\VMPipe32.dll afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2396 afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe Token: SeDebugPrivilege 2396 afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2396 afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe 2396 afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\afe8bbef79fe01712c2b222912fc0ec8_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2396
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e809293c257f5b01e70f07e78a5de2c9
SHA182040ed941283056bd3b449df172019d6db2c5da
SHA2569be8ba47700d381262071ea3f187b68f3eb682fc281425432114ef9d45100819
SHA512b439dd071a00b80f004539f49dfba904ab196a1ef78713b8e026d2053326c6a6733ae8779ac71d576105703a9dcd045a1c6fdbf096d96e585352fe5ae27bef09
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350