Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe
-
Size
565KB
-
MD5
dc51e3c7fdf443110ef0b42251a74c5a
-
SHA1
96650ce61fb2f3aa18ac55b8782e6a4186027ea1
-
SHA256
5e41dc342bcdba4d3e085f52a35721c6b03d8f3ef95310214577d009817faf82
-
SHA512
84f9294d794ae29fdc2b65d54acd0e0f44cd8b3ce42bc01ef3c3c1dc1862fcbb043b7e22842add0586097c38120366dd06c21449ab455425e92a470807c26f5c
-
SSDEEP
12288:PCmBr+buJqVzYKj86swbdOVzYKj86sz6OaDDVzYKj86srv7Xxd:P9Br+bu8pYOepYOIPWpYOKvzxd
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe -
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral2/memory/4376-59-0x0000000000400000-0x00000000004ED000-memory.dmp modiloader_stage2 behavioral2/memory/4376-62-0x0000000000400000-0x00000000004ED000-memory.dmp modiloader_stage2 -
resource yara_rule behavioral2/files/0x000c000000023b11-45.dat aspack_v212_v242 behavioral2/files/0x000b000000023b62-54.dat aspack_v212_v242 -
Loads dropped DLL 4 IoCs
pid Process 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe Token: SeDebugPrivilege 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe 4376 dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc51e3c7fdf443110ef0b42251a74c5a_JaffaCakes118.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4376
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5ea1abe49f7704d313a13bd8a7b348a64
SHA141b0e07da99f9dd4087f9e3e8369156d5994c78a
SHA256592a7d7622833a627f898566d7cfdebf9f2655cc328c132e44b2c010f44c0a52
SHA5129594971e293cfc11868901fd3fd5890f7f9403669b2b4736ead0ce828bc0f72b1d31207140e628250b788de233a1d17780359a86d0b36b0dbb371c2d73aea444
-
Filesize
145KB
MD5174abe04b1a7b6c0197aa0789e8f66bb
SHA1af84173fb7ec0a2d2000c98ef22ae6da170ff8e9
SHA2566e8433d522920db97e52f8f67797f9d596347f7b19b56eb96d1f422617b5c4da
SHA512b8555dce4ba2fea3345df8d85cc01c7f23a5673f1f840576ec9029b73d07f6029a3172a4467cdf7455850ee1a7586aa950dc464db8159a5e781ba8f164f33204