Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 11:12

General

  • Target

    ccafbc0dc9af3a1e10cf69eea429fb96_JaffaCakes118.exe

  • Size

    894KB

  • MD5

    ccafbc0dc9af3a1e10cf69eea429fb96

  • SHA1

    884a0a8d8b4c0f165b56f831e953f05082ab08a3

  • SHA256

    c3d8ab3258f3a6c98fd4da79c60973a1c0989e39811920b96847812a29e50aa1

  • SHA512

    bbd36de70d7820da19dc8666bed2e26ba010aafe8448db9201ded2b9152a90e18e6311649c630ae30884ac6629e57a24d14db64c598f2abfb2e1996fdb0d88c5

  • SSDEEP

    12288:Yxo7YNQg2YcKify3iTntxrr0cuUPnIpVwDIX9cgtWb2/ExgDj48uSeJro0okzLPs:YKwQrsiK3Sr0ckHCb2Mxg348uS8oqzLE

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 20 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccafbc0dc9af3a1e10cf69eea429fb96_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ccafbc0dc9af3a1e10cf69eea429fb96_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\ccafbc0dc9af3a1e10cf69eea429fb96_JaffaCakes118.EXE
      ccafbc0dc9af3a1e10cf69eea429fb96_JaffaCakes118.EXE
      2⤵
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\mstwain32.exe
        "C:\Windows\mstwain32.exe" \melt "C:\Users\Admin\AppData\Local\Temp\ccafbc0dc9af3a1e10cf69eea429fb96_JaffaCakes118.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\mstwain32.EXE
          mstwain32.EXE
          4⤵
          • UAC bypass
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:1508
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mstwain32.exe

    Filesize

    894KB

    MD5

    ccafbc0dc9af3a1e10cf69eea429fb96

    SHA1

    884a0a8d8b4c0f165b56f831e953f05082ab08a3

    SHA256

    c3d8ab3258f3a6c98fd4da79c60973a1c0989e39811920b96847812a29e50aa1

    SHA512

    bbd36de70d7820da19dc8666bed2e26ba010aafe8448db9201ded2b9152a90e18e6311649c630ae30884ac6629e57a24d14db64c598f2abfb2e1996fdb0d88c5

  • \??\c:\users\admin\appdata\local\temp\00000000

    Filesize

    14B

    MD5

    b7e8e583a34d4d59a3fa6d5ca7d9c3cb

    SHA1

    57056a74b70e0e5f616096cfef0f599e06931f52

    SHA256

    590355785ceb06d2f608ca3b276b8bdc3207119d296b97bb796829eeff016157

    SHA512

    aa05853ded06beb245fd840057fe8dc8eead9344327b5a1c014a0a63407b48af21f0bf0d94c7ee994cea0014e5910043a7b6d9b57f29893d89df30c23676c224

  • memory/1372-56-0x0000000000400000-0x00000000007AC01A-memory.dmp

    Filesize

    3.7MB

  • memory/1508-67-0x0000000001EF0000-0x0000000001EFE000-memory.dmp

    Filesize

    56KB

  • memory/1508-65-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-71-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-84-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-68-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-57-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-66-0x00000000002B0000-0x00000000002B8000-memory.dmp

    Filesize

    32KB

  • memory/1508-74-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-64-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-62-0x0000000001EF0000-0x0000000001EFE000-memory.dmp

    Filesize

    56KB

  • memory/1508-77-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-58-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/1508-81-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2204-20-0x0000000000400000-0x00000000007AC01A-memory.dmp

    Filesize

    3.7MB

  • memory/2916-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2916-31-0x0000000000770000-0x00000000008F1000-memory.dmp

    Filesize

    1.5MB

  • memory/2916-33-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-23-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-22-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-3-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-5-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-11-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-9-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-21-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-19-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-13-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-15-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2916-7-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB