Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8e276497003c5795c28f758312515983.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8e276497003c5795c28f758312515983.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8e276497003c5795c28f758312515983.exe
-
Size
317KB
-
MD5
8e276497003c5795c28f758312515983
-
SHA1
39fc44a790466cc040cde37e768d2daa399d4caf
-
SHA256
71890ac681e94d88011f6ba77d25426a422e77ed1a34568571f6e38cf890336a
-
SHA512
fec273c2bd53d43429bbc00a9a055b81526a8987b5d8fd20ad66ddae07162e6e6aa2eab7263aa29672fccf71c83aa3302b1640b2fdef9252da9ea4bb240d2b9d
-
SSDEEP
6144:EJ7oQhFDK05HxmcMmnl/3lYUBgNB3Jqi87mLufNiMbRS2Ds:EJHF75Hxmynl/3WUB+BQi875iYsks
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sistema Operacional Microsoft.exe -
ModiLoader Second Stage 23 IoCs
resource yara_rule behavioral2/memory/3444-3-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3444-2-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3444-4-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3444-6-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/3444-17-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-28-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-26-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-29-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-33-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-34-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-35-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-36-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-37-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-38-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-39-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-40-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-41-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-42-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-43-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-44-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-45-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-46-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 behavioral2/memory/2224-47-0x0000000000400000-0x000000000044B000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_8e276497003c5795c28f758312515983.exe -
Executes dropped EXE 2 IoCs
pid Process 1004 Sistema Operacional Microsoft.exe 2224 Sistema Operacional Microsoft.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 Sistema Operacional Microsoft.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sistema Operacional Microsoft = "C:\\Windows\\Sistema Operacional Microsoft.exe" Sistema Operacional Microsoft.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_8e276497003c5795c28f758312515983.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Sistema Operacional Microsoft.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sistema Operacional Microsoft.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5036 set thread context of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 1004 set thread context of 2224 1004 Sistema Operacional Microsoft.exe 88 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Sistema Operacional Microsoft.exe JaffaCakes118_8e276497003c5795c28f758312515983.exe File opened for modification C:\Windows\Sistema Operacional Microsoft.exe JaffaCakes118_8e276497003c5795c28f758312515983.exe File opened for modification C:\Windows\Sistema Operacional Microsoft.exe Sistema Operacional Microsoft.exe File created C:\Windows\ntdtcstp.dll Sistema Operacional Microsoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e276497003c5795c28f758312515983.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e276497003c5795c28f758312515983.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sistema Operacional Microsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sistema Operacional Microsoft.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3444 JaffaCakes118_8e276497003c5795c28f758312515983.exe Token: SeBackupPrivilege 3656 vssvc.exe Token: SeRestorePrivilege 3656 vssvc.exe Token: SeAuditPrivilege 3656 vssvc.exe Token: SeDebugPrivilege 2224 Sistema Operacional Microsoft.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 1004 Sistema Operacional Microsoft.exe 1004 Sistema Operacional Microsoft.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 5036 wrote to memory of 3444 5036 JaffaCakes118_8e276497003c5795c28f758312515983.exe 83 PID 3444 wrote to memory of 1004 3444 JaffaCakes118_8e276497003c5795c28f758312515983.exe 87 PID 3444 wrote to memory of 1004 3444 JaffaCakes118_8e276497003c5795c28f758312515983.exe 87 PID 3444 wrote to memory of 1004 3444 JaffaCakes118_8e276497003c5795c28f758312515983.exe 87 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 PID 1004 wrote to memory of 2224 1004 Sistema Operacional Microsoft.exe 88 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Sistema Operacional Microsoft.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe2⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\Sistema Operacional Microsoft.exe"C:\Windows\Sistema Operacional Microsoft.exe" \melt "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e276497003c5795c28f758312515983.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\Sistema Operacional Microsoft.exe"C:\Windows\Sistema Operacional Microsoft.exe"4⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2224
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3656
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD58e276497003c5795c28f758312515983
SHA139fc44a790466cc040cde37e768d2daa399d4caf
SHA25671890ac681e94d88011f6ba77d25426a422e77ed1a34568571f6e38cf890336a
SHA512fec273c2bd53d43429bbc00a9a055b81526a8987b5d8fd20ad66ddae07162e6e6aa2eab7263aa29672fccf71c83aa3302b1640b2fdef9252da9ea4bb240d2b9d
-
Filesize
40KB
MD53f689ab34ba20ffbc647f3c4ce7c9c92
SHA10275be6c5d43a4916f4b6b2b4aa06398e193206f
SHA256003eb1ba56dc99c6a6d4e8f35233edcee64aa8001ac5f7289369cae2325ff019
SHA5125336b3d410c21746a81a67c1b0da791d5592d4dc42fe559bc9b12a89b6bc6aef04b385a1566e55a7599c2489741ee7b0953f9cb0b3b5b9a9feb006678e2bdbce