Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 06:13
Behavioral task
behavioral1
Sample
JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe
-
Size
108KB
-
MD5
6ab5a11f92f3a6ba7e6e54b53f6b87fb
-
SHA1
7cc030edf8e47b07be265d6a8dca96c7097c2103
-
SHA256
92b390040b832be2edd85939cefe1fbc92bde893648a455fa567c4917a88e358
-
SHA512
0f8514ce4c884d76738e9896681ee3d631608100a8447965b6a69a13e89e54383c50e6f255d722399334f3cda8ce6cd11cef2ef3663d9f66b962219741b2147f
-
SSDEEP
3072:k4oy8j7VnNdrPHaSekwi+mW+2XYcY4A0out:kI8jZ7rvaU3+mWroB4A0oS
Malware Config
Extracted
latentbot
sananelan43.zapto.org
Signatures
-
Latentbot family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe -
ModiLoader Second Stage 15 IoCs
resource yara_rule behavioral2/memory/1576-17-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-18-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-21-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-24-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-27-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-30-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-33-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-36-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-39-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-42-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-45-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-48-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-51-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-54-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 behavioral2/memory/1576-57-0x0000000000400000-0x0000000000450000-memory.dmp modiloader_stage2 -
Loads dropped DLL 4 IoCs
pid Process 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe -
resource yara_rule behavioral2/memory/1576-0-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-17-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-18-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-21-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-24-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-27-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-30-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-33-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-36-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-39-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-42-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-45-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-48-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-51-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-54-0x0000000000400000-0x0000000000450000-memory.dmp upx behavioral2/memory/1576-57-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\VMPipe32.dll JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe Token: SeDebugPrivilege 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe 1576 JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ab5a11f92f3a6ba7e6e54b53f6b87fb.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1576
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5768e4ec0b19ec5c33ee7caa2d752486c
SHA169ef5ca69972c4d72ca8adaf213ed046dbe26b4a
SHA256215244ebdf6e92ab869ecb2c792eb1cf6cb83175fff4b7a4b7eaaf309df8842c
SHA512a867371370f2c9f333edff07c4879cf39bba0b50767c0ed4d38d6b52171fdb46e11312979d58f074cf77167327e2cae47ff5e67babaa36a8ddf99ad2d0b8e62d
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350