Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 12:36
Behavioral task
behavioral1
Sample
JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe
-
Size
291KB
-
MD5
6cab604c33d0bfb4987c4ad894fe6dbc
-
SHA1
9564d7537064c1930b18a286e4dec84831f826b9
-
SHA256
329e3590b67ba305e571b5aa7e9eb37cfc09b3e6b94954763268a84d4a0c8b0b
-
SHA512
2b2b252895fc3d7a05a176128da718505a177479dcff5a66a49662f664428f3fac3140e2fc7bf823310e8438b414eef0c97fb2a3ef1a3d286ceaa9ed6da7ede9
-
SSDEEP
3072:eoy8j7VnNdrPHaSekwi+mWniNq8out84sGaslbW1fAxzUrkILJJ:+8jZ7rvaU3+mW2q8oSxslFiz4L
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe -
ModiLoader Second Stage 17 IoCs
resource yara_rule behavioral1/memory/1384-11-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-12-0x0000000075910000-0x0000000075A00000-memory.dmp modiloader_stage2 behavioral1/memory/1384-13-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-16-0x0000000075910000-0x0000000075A00000-memory.dmp modiloader_stage2 behavioral1/memory/1384-17-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-20-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-23-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-26-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-29-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-32-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-35-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-38-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-41-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-44-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-47-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-50-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 behavioral1/memory/1384-53-0x0000000000400000-0x00000000004A9000-memory.dmp modiloader_stage2 -
Loads dropped DLL 2 IoCs
pid Process 1384 JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe 1384 JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe -
resource yara_rule behavioral1/memory/1384-0-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-11-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-12-0x0000000075910000-0x0000000075A00000-memory.dmp upx behavioral1/memory/1384-13-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-16-0x0000000075910000-0x0000000075A00000-memory.dmp upx behavioral1/memory/1384-17-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-20-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-23-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-26-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-29-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-32-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-35-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-38-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-41-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-44-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-47-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-50-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral1/memory/1384-53-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1384 JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe Token: SeDebugPrivilege 1384 JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1384 JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe 1384 JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cab604c33d0bfb4987c4ad894fe6dbc.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD536f166c3662d2ef1ba0ea659faa82bc2
SHA17958f1c3f982f6e7ad4c620dc2a96bd9661c19be
SHA256d5d14961974d9a239c90e41860255d9ab46fd9e3297095f2cc3b197687c9122f
SHA5127de99d6e86c205e372e82f406321c0eefa622328648383fc0db6f628daf01f913d62b46f97022ec6827d54b338ff0fab051a78be37f6816bfac14824167081c3
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350