Analysis

  • max time kernel
    146s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 01:07

General

  • Target

    dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe

  • Size

    565KB

  • MD5

    dc51e3c7fdf443110ef0b42251a74c5a

  • SHA1

    96650ce61fb2f3aa18ac55b8782e6a4186027ea1

  • SHA256

    5e41dc342bcdba4d3e085f52a35721c6b03d8f3ef95310214577d009817faf82

  • SHA512

    84f9294d794ae29fdc2b65d54acd0e0f44cd8b3ce42bc01ef3c3c1dc1862fcbb043b7e22842add0586097c38120366dd06c21449ab455425e92a470807c26f5c

  • SSDEEP

    12288:PCmBr+buJqVzYKj86swbdOVzYKj86sz6OaDDVzYKj86srv7Xxd:P9Br+bu8pYOepYOIPWpYOKvzxd

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • UAC bypass 3 TTPs 1 IoCs
  • ModiLoader Second Stage 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe"
    1⤵
    • UAC bypass
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1980
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Uninstall.bat" C:\Users\Admin\AppData\Local\Temp\dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3044
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Uninstall.bat

    Filesize

    207B

    MD5

    404745120599709daf7901f17c43a7e5

    SHA1

    247c9e558241de4415f383ada3b4198259e0b59e

    SHA256

    b8206f0dd8276874d88a69a3e9e79c914a6f9cb9bfa6de7bdf4f216f0f105d3b

    SHA512

    0c3d7295b5eef46dac8377485ecb1ff4423a2a4c414b50a0ed813ee6171499b172063c199e69788bf0c8f4909e5775d06d17bdac18f7dfaffe810639470ffc6b

  • \Users\Admin\AppData\Local\Temp\cmsetac.dll

    Filesize

    164KB

    MD5

    ea1abe49f7704d313a13bd8a7b348a64

    SHA1

    41b0e07da99f9dd4087f9e3e8369156d5994c78a

    SHA256

    592a7d7622833a627f898566d7cfdebf9f2655cc328c132e44b2c010f44c0a52

    SHA512

    9594971e293cfc11868901fd3fd5890f7f9403669b2b4736ead0ce828bc0f72b1d31207140e628250b788de233a1d17780359a86d0b36b0dbb371c2d73aea444

  • \Users\Admin\AppData\Local\Temp\ntdtcstp.dll

    Filesize

    145KB

    MD5

    174abe04b1a7b6c0197aa0789e8f66bb

    SHA1

    af84173fb7ec0a2d2000c98ef22ae6da170ff8e9

    SHA256

    6e8433d522920db97e52f8f67797f9d596347f7b19b56eb96d1f422617b5c4da

    SHA512

    b8555dce4ba2fea3345df8d85cc01c7f23a5673f1f840576ec9029b73d07f6029a3172a4467cdf7455850ee1a7586aa950dc464db8159a5e781ba8f164f33204

  • memory/1980-3-0x0000000001F90000-0x0000000001F91000-memory.dmp

    Filesize

    4KB

  • memory/1980-31-0x0000000003260000-0x00000000032C3000-memory.dmp

    Filesize

    396KB

  • memory/1980-2-0x0000000001F90000-0x0000000001F91000-memory.dmp

    Filesize

    4KB

  • memory/1980-17-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

    Filesize

    4KB

  • memory/1980-16-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/1980-15-0x0000000000600000-0x0000000000601000-memory.dmp

    Filesize

    4KB

  • memory/1980-14-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/1980-9-0x0000000000500000-0x0000000000501000-memory.dmp

    Filesize

    4KB

  • memory/1980-8-0x0000000001F60000-0x0000000001F61000-memory.dmp

    Filesize

    4KB

  • memory/1980-7-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/1980-6-0x0000000001F50000-0x0000000001F51000-memory.dmp

    Filesize

    4KB

  • memory/1980-5-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB

  • memory/1980-10-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/1980-0-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/1980-18-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/1980-1-0x0000000000610000-0x0000000000612000-memory.dmp

    Filesize

    8KB

  • memory/1980-11-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/1980-12-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/1980-13-0x0000000000540000-0x0000000000541000-memory.dmp

    Filesize

    4KB

  • memory/1980-27-0x0000000003AD0000-0x0000000003B3A000-memory.dmp

    Filesize

    424KB

  • memory/1980-26-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/1980-28-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/1980-23-0x0000000003260000-0x00000000032C3000-memory.dmp

    Filesize

    396KB

  • memory/1980-30-0x0000000003AD0000-0x0000000003B3A000-memory.dmp

    Filesize

    424KB

  • memory/1980-32-0x0000000003AD0000-0x0000000003B3A000-memory.dmp

    Filesize

    424KB

  • memory/1980-4-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

    Filesize

    4KB

  • memory/1980-35-0x0000000004660000-0x0000000004670000-memory.dmp

    Filesize

    64KB

  • memory/1980-44-0x0000000003AD0000-0x0000000003B3A000-memory.dmp

    Filesize

    424KB

  • memory/1980-43-0x0000000003260000-0x00000000032C3000-memory.dmp

    Filesize

    396KB

  • memory/1980-42-0x0000000000400000-0x00000000004ED000-memory.dmp

    Filesize

    948KB

  • memory/2824-51-0x00000000025E0000-0x00000000025F0000-memory.dmp

    Filesize

    64KB