Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8e276497003c5795c28f758312515983.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8e276497003c5795c28f758312515983.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8e276497003c5795c28f758312515983.exe
-
Size
317KB
-
MD5
8e276497003c5795c28f758312515983
-
SHA1
39fc44a790466cc040cde37e768d2daa399d4caf
-
SHA256
71890ac681e94d88011f6ba77d25426a422e77ed1a34568571f6e38cf890336a
-
SHA512
fec273c2bd53d43429bbc00a9a055b81526a8987b5d8fd20ad66ddae07162e6e6aa2eab7263aa29672fccf71c83aa3302b1640b2fdef9252da9ea4bb240d2b9d
-
SSDEEP
6144:EJ7oQhFDK05HxmcMmnl/3lYUBgNB3Jqi87mLufNiMbRS2Ds:EJHF75Hxmynl/3WUB+BQi875iYsks
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sistema Operacional Microsoft.exe -
ModiLoader Second Stage 23 IoCs
resource yara_rule behavioral1/memory/2992-4-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2992-2-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2992-5-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2992-6-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2992-16-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-24-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-25-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-26-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-29-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-31-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-32-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-34-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-36-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-38-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-41-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-43-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-45-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-47-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-49-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-51-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-53-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-55-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral1/memory/2052-57-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1068 Sistema Operacional Microsoft.exe 2052 Sistema Operacional Microsoft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Sistema Operacional Microsoft = "C:\\Windows\\Sistema Operacional Microsoft.exe" Sistema Operacional Microsoft.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Sistema Operacional Microsoft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sistema Operacional Microsoft.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_8e276497003c5795c28f758312515983.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2332 set thread context of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 1068 set thread context of 2052 1068 Sistema Operacional Microsoft.exe 36 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Sistema Operacional Microsoft.exe JaffaCakes118_8e276497003c5795c28f758312515983.exe File opened for modification C:\Windows\Sistema Operacional Microsoft.exe JaffaCakes118_8e276497003c5795c28f758312515983.exe File opened for modification C:\Windows\Sistema Operacional Microsoft.exe Sistema Operacional Microsoft.exe File created C:\Windows\ntdtcstp.dll Sistema Operacional Microsoft.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e276497003c5795c28f758312515983.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e276497003c5795c28f758312515983.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sistema Operacional Microsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sistema Operacional Microsoft.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2992 JaffaCakes118_8e276497003c5795c28f758312515983.exe Token: SeBackupPrivilege 2660 vssvc.exe Token: SeRestorePrivilege 2660 vssvc.exe Token: SeAuditPrivilege 2660 vssvc.exe Token: SeDebugPrivilege 2052 Sistema Operacional Microsoft.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 1068 Sistema Operacional Microsoft.exe 1068 Sistema Operacional Microsoft.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2332 wrote to memory of 2992 2332 JaffaCakes118_8e276497003c5795c28f758312515983.exe 31 PID 2992 wrote to memory of 1068 2992 JaffaCakes118_8e276497003c5795c28f758312515983.exe 35 PID 2992 wrote to memory of 1068 2992 JaffaCakes118_8e276497003c5795c28f758312515983.exe 35 PID 2992 wrote to memory of 1068 2992 JaffaCakes118_8e276497003c5795c28f758312515983.exe 35 PID 2992 wrote to memory of 1068 2992 JaffaCakes118_8e276497003c5795c28f758312515983.exe 35 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 PID 1068 wrote to memory of 2052 1068 Sistema Operacional Microsoft.exe 36 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sistema Operacional Microsoft.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe2⤵
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\Sistema Operacional Microsoft.exe"C:\Windows\Sistema Operacional Microsoft.exe" \melt "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\Sistema Operacional Microsoft.exe"C:\Windows\Sistema Operacional Microsoft.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2052
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD58e276497003c5795c28f758312515983
SHA139fc44a790466cc040cde37e768d2daa399d4caf
SHA25671890ac681e94d88011f6ba77d25426a422e77ed1a34568571f6e38cf890336a
SHA512fec273c2bd53d43429bbc00a9a055b81526a8987b5d8fd20ad66ddae07162e6e6aa2eab7263aa29672fccf71c83aa3302b1640b2fdef9252da9ea4bb240d2b9d