Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 20:22
Behavioral task
behavioral1
Sample
JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe
-
Size
2.2MB
-
MD5
680e782739853d9ab89f2a6b929bda9c
-
SHA1
134db29b396c18daad1290dec090ede152c7ae58
-
SHA256
244af2b75e59120c8a306b1b64b946be401d64b4cf3c22c5bead31772b24d116
-
SHA512
ba3ae7b7b4801eca7953379c9dd2fdbe4e9c8fbe628b190b1ed2b38bcf726640f1d2b3bdacca9e8acf89fcc8db5717f6637dfa4863c5766da7d11334946fc784
-
SSDEEP
49152:r94TDiVcvpec5e0mZfyeSywbd4CoohD3msm:r94TD6cvcc5e0mQw+D3Rm
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" BiFrOsT.exe -
Modiloader family
-
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BiFrOsT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" BiFrOsT.exe -
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral1/files/0x002c000000016d70-12.dat modiloader_stage2 behavioral1/memory/2776-20-0x0000000000400000-0x0000000000638000-memory.dmp modiloader_stage2 behavioral1/memory/2492-21-0x0000000000400000-0x00000000005DF000-memory.dmp modiloader_stage2 behavioral1/memory/2288-65-0x0000000000400000-0x00000000005DF000-memory.dmp modiloader_stage2 behavioral1/memory/2492-83-0x0000000000400000-0x00000000005DF000-memory.dmp modiloader_stage2 -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" BiFrOsT.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
pid Process 2892 server.exe 2492 BiFrOsT.exe 2288 BiFrOsT.exe 1184 server.exe -
Loads dropped DLL 10 IoCs
pid Process 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 2492 BiFrOsT.exe 2892 server.exe 2544 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" BiFrOsT.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" BiFrOsT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" BiFrOsT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BiFrOsT.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2892 set thread context of 1184 2892 server.exe 33 -
resource yara_rule behavioral1/memory/2492-29-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-24-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-25-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-26-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-66-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-22-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-30-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-34-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-27-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-39-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-40-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-31-0x0000000002010000-0x000000000309E000-memory.dmp upx behavioral1/memory/2492-28-0x0000000002010000-0x000000000309E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI BiFrOsT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2544 2288 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BiFrOsT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BiFrOsT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2492 BiFrOsT.exe 1184 server.exe 1184 server.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe Token: SeDebugPrivilege 2492 BiFrOsT.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 server.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2892 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 30 PID 2776 wrote to memory of 2892 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 30 PID 2776 wrote to memory of 2892 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 30 PID 2776 wrote to memory of 2892 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 30 PID 2776 wrote to memory of 2492 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 31 PID 2776 wrote to memory of 2492 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 31 PID 2776 wrote to memory of 2492 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 31 PID 2776 wrote to memory of 2492 2776 JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe 31 PID 2492 wrote to memory of 2288 2492 BiFrOsT.exe 32 PID 2492 wrote to memory of 2288 2492 BiFrOsT.exe 32 PID 2492 wrote to memory of 2288 2492 BiFrOsT.exe 32 PID 2492 wrote to memory of 2288 2492 BiFrOsT.exe 32 PID 2492 wrote to memory of 1096 2492 BiFrOsT.exe 19 PID 2492 wrote to memory of 1164 2492 BiFrOsT.exe 20 PID 2492 wrote to memory of 1212 2492 BiFrOsT.exe 21 PID 2492 wrote to memory of 1632 2492 BiFrOsT.exe 25 PID 2492 wrote to memory of 2892 2492 BiFrOsT.exe 30 PID 2492 wrote to memory of 2892 2492 BiFrOsT.exe 30 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2892 wrote to memory of 1184 2892 server.exe 33 PID 2288 wrote to memory of 2544 2288 BiFrOsT.exe 34 PID 2288 wrote to memory of 2544 2288 BiFrOsT.exe 34 PID 2288 wrote to memory of 2544 2288 BiFrOsT.exe 34 PID 2288 wrote to memory of 2544 2288 BiFrOsT.exe 34 PID 1184 wrote to memory of 1212 1184 server.exe 21 PID 1184 wrote to memory of 1212 1184 server.exe 21 PID 1184 wrote to memory of 1212 1184 server.exe 21 PID 1184 wrote to memory of 1212 1184 server.exe 21 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" BiFrOsT.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_680e782739853d9ab89f2a6b929bda9c.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\BiFrOsT.exe"C:\Users\Admin\AppData\Local\Temp\BiFrOsT.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\BiFrOsT.exe"C:\Users\Admin\AppData\Local\Temp\BiFrOsT.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 1165⤵
- Loads dropped DLL
- Program crash
PID:2544
-
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5ff8bdd790f373a63c58231260e7d9735
SHA1bd1ff5abafe58dbfbe58841aa58b37e4c14dfbf2
SHA256c802b070e7bebe5465f0cad4026876eae129cffb4f192b81ab215a0bc85a345a
SHA512d1843196321f6b3285c0941f3e088ff68d44cca0100d71c74f8c4300edafa38262cbbad3f9d886a519a5971a074ba95af48d1acb6c38a949d82f2ef68dda71d2
-
Filesize
288KB
MD5f43eb9d34f6462f4c48210c4c0f5a39e
SHA188b2efd2723a7c13b42c64af00bcc178893859ec
SHA256ed5bbfd85631de43a25f3c1c4f8a7851f621330772b02d436da782432a269c2a
SHA5124cb4e25842736cdb083cb70559657fdf391b656d208fcc557778b08e6213631fb778f2b6d80432ddb2f37f5229213f34ba5e78fa9137b7cb14c7bb7e6c5331a2