Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 02:01
Behavioral task
behavioral1
Sample
f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe
-
Size
376KB
-
MD5
f6c65d3d7783d6c6b21383e4ee50f6d0
-
SHA1
28f16d6c44991249b52af17e134649bfd1911ad6
-
SHA256
b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4f
-
SHA512
f9b5d9b1de92039f6c06994a7ac4dfaede3abf51e085fad07f52ae227910eab21e0e1c984812800debc90dccbd08698bb7c845c434a36a4766511173cc9bfa68
-
SSDEEP
6144:c9ctxJKFzDz8KFykipAjWnt7Q4VonPGgmFrrDciW1oreICFpz7K/obXko4:c6XKxYKBipBgBmFrrDcixeIkp6/GXko4
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2648-11-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts update1.exe -
Executes dropped EXE 6 IoCs
pid Process 2780 update2.exe 2548 update1.exe 2604 update2.exe 776 auditpol.exe 2900 uqirm.exe 1540 uqirm.exe -
Loads dropped DLL 32 IoCs
pid Process 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 2780 update2.exe 2780 update2.exe 2780 update2.exe 2548 update1.exe 2548 update1.exe 2548 update1.exe 2780 update2.exe 2604 update2.exe 2604 update2.exe 2604 update2.exe 2548 update1.exe 2548 update1.exe 776 auditpol.exe 776 auditpol.exe 776 auditpol.exe 2604 update2.exe 2604 update2.exe 2900 uqirm.exe 2900 uqirm.exe 2900 uqirm.exe 2900 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 776 auditpol.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\auditpol = "C:\\Users\\Admin\\AppData\\Local\\auditpol.exe" update1.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\auditpol = "C:\\Users\\Admin\\AppData\\Local\\auditpol.exe" update1.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9455F075-1FF9-EA4A-CC54-36319A2CAAF6} = "C:\\Users\\Admin\\AppData\\Roaming\\Tyuwwy\\uqirm.exe" uqirm.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2648 set thread context of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2780 set thread context of 2604 2780 update2.exe 34 PID 2900 set thread context of 1540 2900 uqirm.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqirm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language auditpol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqirm.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy update1.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" update1.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\404F36AC-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe 1540 uqirm.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeSecurityPrivilege 2604 update2.exe Token: SeRestorePrivilege 2604 update2.exe Token: SeBackupPrivilege 2604 update2.exe Token: SeSecurityPrivilege 2548 update1.exe Token: SeSecurityPrivilege 2548 update1.exe Token: SeManageVolumePrivilege 2476 WinMail.exe Token: SeSecurityPrivilege 2228 DllHost.exe Token: SeSecurityPrivilege 2228 DllHost.exe Token: SeSecurityPrivilege 776 auditpol.exe Token: SeSecurityPrivilege 776 auditpol.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2780 update2.exe 2900 uqirm.exe 2476 WinMail.exe 776 auditpol.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2548 update1.exe 776 auditpol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2768 2648 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2780 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2780 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2780 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2780 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2780 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2780 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2780 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 32 PID 2768 wrote to memory of 2548 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 33 PID 2768 wrote to memory of 2548 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 33 PID 2768 wrote to memory of 2548 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 33 PID 2768 wrote to memory of 2548 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 33 PID 2768 wrote to memory of 2548 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 33 PID 2768 wrote to memory of 2548 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 33 PID 2768 wrote to memory of 2548 2768 f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe 33 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2780 wrote to memory of 2604 2780 update2.exe 34 PID 2548 wrote to memory of 776 2548 update1.exe 36 PID 2548 wrote to memory of 776 2548 update1.exe 36 PID 2548 wrote to memory of 776 2548 update1.exe 36 PID 2548 wrote to memory of 776 2548 update1.exe 36 PID 2548 wrote to memory of 776 2548 update1.exe 36 PID 2548 wrote to memory of 776 2548 update1.exe 36 PID 2548 wrote to memory of 776 2548 update1.exe 36 PID 2604 wrote to memory of 2900 2604 update2.exe 37 PID 2604 wrote to memory of 2900 2604 update2.exe 37 PID 2604 wrote to memory of 2900 2604 update2.exe 37 PID 2604 wrote to memory of 2900 2604 update2.exe 37 PID 2604 wrote to memory of 2900 2604 update2.exe 37 PID 2604 wrote to memory of 2900 2604 update2.exe 37 PID 2604 wrote to memory of 2900 2604 update2.exe 37 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2900 wrote to memory of 1540 2900 uqirm.exe 38 PID 2604 wrote to memory of 2196 2604 update2.exe 39 PID 2604 wrote to memory of 2196 2604 update2.exe 39 PID 2604 wrote to memory of 2196 2604 update2.exe 39 PID 2604 wrote to memory of 2196 2604 update2.exe 39
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1064
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\f6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exef6c65d3d7783d6c6b21383e4ee50f6d0_JaffaCakes118.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\update2.exe"C:\Users\Admin\AppData\Local\Temp\update2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\update2.exeC:\Users\Admin\AppData\Local\Temp\update2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe"C:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exeC:\Users\Admin\AppData\Roaming\Tyuwwy\uqirm.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp493bed56.bat"6⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\update1.exe"C:\Users\Admin\AppData\Local\Temp\update1.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\auditpol.exe"C:\Users\Admin\AppData\Local\auditpol.exe" C:\Users\Admin\AppData\Local\Temp\update1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:776
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1220
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2476
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5eeb16755e50c61dae015e219bc37d714
SHA1c0cf8cc2f22aed5b6bf602ca8fd3f8398cc8d945
SHA256877aba7fd3580a1bceb3fddaa81ebb7a6a671ff110a4a62e466df53324acf534
SHA51289d8428dbf89a65be0c0c0c8deb0132ebb70b8581726fa3b8bca14c276912bd4ee0589af69a892b4881f0c1b2e168788b45a6c0791073e6d7f1fa3deaa072523
-
Filesize
193B
MD52b770d96a0d94d0a278991262c7fad0e
SHA125f8b66ad246bc9f71afccf7118e0691f011da02
SHA256d5c03c966e485b41a3a7d4b16d2427b2c36b7bec2e82076cb174528ae392a58b
SHA5127795b99c1f85a26e69619407b829d602576798cc4b771876e8a52bf813d64611686e982b875997bdd8337e0e4f176c8ab0e7f372578ff7d51ed34d2ee6a04c77
-
Filesize
24KB
MD591029d37cf86ecc5d58605676eab6643
SHA1e6b6bcd7bb30b8c8bb05489a89238eb4793c38fe
SHA256d4bda0161466452d3f75d14472720d95d168ac09e2d63fedef45538576f98e0b
SHA512377b33a534f955e48299f2532216482ee14ae17a4e52a44b2a40b98c4b274505e60fb1c07c61f4e84644644fd4757f8dcefc12359712fe53ad9e4122bd12961e
-
Filesize
64KB
MD59f036c83663c4a3e5f5382adf6f32bcc
SHA1842870e3dfb3ee76e927d93c517f9753c872d751
SHA2564eeef6ad75578f995af8f662d5a33581fafb19de9b5dd1fb7d9294fa80172874
SHA512097b79b332810ff212fe59c60f2480c99538f8b0309c35c2955d9e5c677047569edadc8669cbf82ca21667ec71449f3e34542c8d24b065845efe228eaaae13c9
-
Filesize
668B
MD58808ce87b6e0fb61f4bdeacbafebbed4
SHA15a0dc188cc8f822bfd80d0bd49984775432731fc
SHA25641c235c508b86cd8221d11e3f574d08915251fd6f9c86c74481ff9b2ab12c98b
SHA512bec4949cefba10cd3e857e6070b75b54acf4c28056f5455fd1cb31a0cad5e592ddd8cc3d67bd303f19adb147d9cd5ab415a715e8c15b9ef6e9a1bc2cf25fa246
-
Filesize
1005B
MD5112e18967b8970ac0a6e327829ac3b9a
SHA10a889ed24b90ed877b912e30440154c46fca8205
SHA256ed04cb265356d86d787d5b5d16cd07bd12402dbb63e91d48d40849a9be769822
SHA512f6306cb8e75d091d1c5708bbe1b038005c7dce6db0f8dc9c3f53f558dab7d9b9714a56b89ee7980f4a4ee96a72e92fecc2cf95b893ac5ce5fa4f419ed6cb54f1
-
Filesize
884B
MD53f0493d494f1ca681c73976f4f97c262
SHA151766ebd206c8a62b3e1604fd64ac7be896fe909
SHA256aa4f8c0fff53953056dff9c26af2c2bb97245c32d523982981d307270f48a308
SHA512ea7a4717238285dbce3336d30410d8647ebfa37d858f92c555f8d0ce2722516ad435d2f8bad2359699fbfe84094b1464795f8657bf7d570aea761abef5027b6b
-
Filesize
144KB
MD5de8b2505379dc0690000155dc1d4b849
SHA1a9a703a20b6536d3d80f5e657b26c409e00c4162
SHA256f3e0cb8e1603b70209208e67961d9c5cc0b07e31e1cfebcffb2603218ab7dd50
SHA5129d1ec27407edc66867083bb27d3f6fa37040948ebdf19a9ab55dc280d33c5525294a92ccde24dbb0985e67aba058080a169a52531a081a6d0cb46cf41e5ff2d8
-
Filesize
159KB
MD570f92610b1bd700ff472997dfecb689c
SHA1ddac19bc8d97f9ac1d1c754b7193eac5f4b249f7
SHA256bd30f98ffb8d8cfb4868253e51d5a5927aeb53ac4d9e431a4ba8fc3517a76423
SHA512564003358a8fdb727838f5962af9c25cca1b5e7b8021e7e74babf14fc12d989414ff77f81918784fdf684cb8c19b82ffcacee3a0fa1e85001fc1ee6b614124bb
-
Filesize
159KB
MD520eba9c267132c5ad4176942eddd274c
SHA1823d233fb6a76bad935daf70d6b567b39c19f21a
SHA2564dfba4f097d606e69c70c196010501269167b7634959a20079788db0f66f838d
SHA5122218e8cdb3b1e609ebc6776546fd8d6192c5c65d8f0526bd78d2566f6cc9ce8fc3237291ec07f940662f012b73e01b152e60bcd8dc1f7026cd48713b139dc953