Malware Analysis Report

2024-08-06 14:19

Sample ID 240619-1qwrbstbpa
Target 00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118
SHA256 0e7ab7acc0303aef0c0820c23167135ac35ad3a03e836f601059abe325bdfaf9
Tags
upx modiloader evasion trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0e7ab7acc0303aef0c0820c23167135ac35ad3a03e836f601059abe325bdfaf9

Threat Level: Known bad

The file 00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

upx modiloader evasion trojan

UAC bypass

ModiLoader, DBatLoader

ModiLoader Second Stage

Checks computer location settings

UPX packed file

Deletes itself

Loads dropped DLL

Executes dropped EXE

Checks whether UAC is enabled

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Uses Volume Shadow Copy service COM API

System policy modification

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-19 21:51

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 21:51

Reported

2024-06-19 21:54

Platform

win7-20240508-en

Max time kernel

143s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mvrsync.exe N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\mvrsync.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\mvrsync.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\mvrsync.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mvrsync.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\mvrsync.exe C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
File opened for modification C:\Windows\mvrsync.exe C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
File created C:\Windows\drvstore.dll C:\Windows\mvrsync.exe N/A
File created C:\Windows\bguiv32.dll C:\Windows\mvrsync.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mvrsync.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mvrsync.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\mvrsync.exe N/A
N/A N/A C:\Windows\mvrsync.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mvrsync.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\mvrsync.exe

"C:\Windows\mvrsync.exe" \erit "C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp

Files

memory/2432-0-0x0000000000400000-0x0000000000555000-memory.dmp

memory/2432-1-0x00000000002A0000-0x00000000002A1000-memory.dmp

memory/2432-2-0x0000000002100000-0x0000000002101000-memory.dmp

memory/2432-7-0x0000000003F50000-0x0000000003F60000-memory.dmp

C:\Windows\mvrsync.exe

MD5 00b62b4528800a8009bed8bdd9ddf09e
SHA1 c4a37a12f8eb65b002db66d18c77b90dec97a1b9
SHA256 0e7ab7acc0303aef0c0820c23167135ac35ad3a03e836f601059abe325bdfaf9
SHA512 acc8a5f915745c3f1bdbbf53f2aa5b8e75f74c6b1b6aa80000215fd3489128f4c2d9afae7a0bd35aac13029e1bd673ea0346853139ee417521506851d5ca429b

memory/2432-14-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-16-0x0000000000400000-0x0000000000555000-memory.dmp

memory/2432-15-0x0000000003F50000-0x00000000040A5000-memory.dmp

memory/1572-22-0x00000000003B0000-0x00000000003B1000-memory.dmp

memory/1572-21-0x0000000002350000-0x0000000002360000-memory.dmp

memory/1572-24-0x0000000002F20000-0x0000000002F2E000-memory.dmp

memory/1572-26-0x0000000075A30000-0x0000000075A31000-memory.dmp

memory/1572-27-0x0000000075A20000-0x0000000075B10000-memory.dmp

memory/1572-28-0x0000000075A20000-0x0000000075B10000-memory.dmp

memory/1572-29-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-32-0x0000000075A20000-0x0000000075B10000-memory.dmp

memory/1572-31-0x0000000002F20000-0x0000000002F2E000-memory.dmp

memory/1572-30-0x0000000000740000-0x0000000000748000-memory.dmp

memory/2432-33-0x0000000003F50000-0x00000000040A5000-memory.dmp

memory/1572-34-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-35-0x0000000002350000-0x0000000002360000-memory.dmp

memory/1572-37-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-42-0x0000000003000000-0x0000000003010000-memory.dmp

memory/1572-41-0x0000000075A20000-0x0000000075B10000-memory.dmp

memory/1572-40-0x0000000075A20000-0x0000000075B10000-memory.dmp

memory/1572-43-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-50-0x0000000003040000-0x0000000003050000-memory.dmp

memory/1572-47-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-51-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-57-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-60-0x0000000000400000-0x0000000000555000-memory.dmp

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\mvrsync.lnk

MD5 ea8e2602e9cbfd8197beb1552b53eef6
SHA1 8010cc3d4e013b157cb8f67ba86733befe627a79
SHA256 c9a173586b89c3fb3d3948c7b17156403d497fe711692807eca5aa93887a09ea
SHA512 79dde9d8227a4bb8a7bd52cc508554fff49c19039feb2770b76c0ffe466a53794fc4dc2dd9dfedbb73f458c3a69b1d192a3a8229296cf7ac6b2b900cb18d526f

memory/1572-64-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-67-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-74-0x00000000022D0000-0x00000000022E0000-memory.dmp

memory/1572-71-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-75-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-79-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-82-0x0000000000400000-0x0000000000555000-memory.dmp

memory/1572-86-0x0000000000400000-0x0000000000555000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 21:51

Reported

2024-06-19 21:54

Platform

win10v2004-20240508-en

Max time kernel

145s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mvrsync.exe N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\mvrsync.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\mvrsync.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\mvrsync.exe N/A
N/A N/A C:\Windows\mvrsync.exe N/A
N/A N/A C:\Windows\mvrsync.exe N/A
N/A N/A C:\Windows\mvrsync.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\mvrsync.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mvrsync.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\mvrsync.exe C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
File opened for modification C:\Windows\mvrsync.exe C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
File created C:\Windows\drvstore.dll C:\Windows\mvrsync.exe N/A
File created C:\Windows\bguiv32.dll C:\Windows\mvrsync.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mvrsync.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mvrsync.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\mvrsync.exe N/A
N/A N/A C:\Windows\mvrsync.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mvrsync.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\mvrsync.exe

"C:\Windows\mvrsync.exe" \erit "C:\Users\Admin\AppData\Local\Temp\00b62b4528800a8009bed8bdd9ddf09e_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp
US 8.8.8.8:53 vale-evren.no-ip.biz udp

Files

memory/3152-0-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3152-1-0x0000000000660000-0x0000000000661000-memory.dmp

C:\Windows\mvrsync.exe

MD5 00b62b4528800a8009bed8bdd9ddf09e
SHA1 c4a37a12f8eb65b002db66d18c77b90dec97a1b9
SHA256 0e7ab7acc0303aef0c0820c23167135ac35ad3a03e836f601059abe325bdfaf9
SHA512 acc8a5f915745c3f1bdbbf53f2aa5b8e75f74c6b1b6aa80000215fd3489128f4c2d9afae7a0bd35aac13029e1bd673ea0346853139ee417521506851d5ca429b

memory/3188-13-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3152-12-0x0000000000400000-0x0000000000555000-memory.dmp

C:\Windows\drvstore.dll

MD5 4e390e571995682798626a5e23d45629
SHA1 5986e1578878c1c3c7f0d9a224946b17fc2e7b0f
SHA256 fa00c11a01a9c4db01bbb76d0d80e12a69a5f9f45f5c295fed3d4210418f4940
SHA512 d2e11ac01d6348f6cf82995767d13f9c8e687a35b2715021568a366a7d81eb5fd25f1ca9d8cd1da63f79c6eda5c8ae396a09fdfae79e66c054e7404339953b9d

memory/3188-22-0x00000000021E0000-0x00000000021E1000-memory.dmp

C:\Windows\bguiv32.dll

MD5 fd752a870d943a183222e50a42e27b00
SHA1 0b4364dc6ecedded0b2e1251e1a78a63e7001675
SHA256 c0643798b8e0c4385ce6f1938fc2cdee4723a131fd59fd85258659a6845f97e3
SHA512 89dc2f0734f6b1c4a3c09921157f9afb3cefbe7e57ed7e8b0025d2bb0621e6e80ce767c480954e5dd0ff2e2b4d2aeef3d8742a75f3beab8f38c35d1f9d059c68

memory/3188-26-0x00000000036C0000-0x00000000036CE000-memory.dmp

memory/3188-32-0x0000000003570000-0x0000000003571000-memory.dmp

memory/3188-31-0x00000000036C0000-0x00000000036CE000-memory.dmp

memory/3188-30-0x0000000002470000-0x0000000002478000-memory.dmp

memory/3188-29-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-33-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-35-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-38-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-42-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-45-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-50-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-53-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-57-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-60-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-64-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-67-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-71-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-74-0x0000000000400000-0x0000000000555000-memory.dmp

memory/3188-78-0x0000000000400000-0x0000000000555000-memory.dmp