Malware Analysis Report

2024-08-06 14:18

Sample ID 240619-yhxybatbnj
Target 0034802f63e162402422a0ee421cdebb_JaffaCakes118
SHA256 3464299477e20ea76deebacf67f27b8acf91b962d0e7cd024e32e5126c16b943
Tags
modiloader evasion persistence trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3464299477e20ea76deebacf67f27b8acf91b962d0e7cd024e32e5126c16b943

Threat Level: Known bad

The file 0034802f63e162402422a0ee421cdebb_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

modiloader evasion persistence trojan upx

ModiLoader, DBatLoader

UAC bypass

ModiLoader Second Stage

Loads dropped DLL

Executes dropped EXE

UPX packed file

Checks computer location settings

Checks whether UAC is enabled

Adds Run key to start application

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

System policy modification

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Uses Volume Shadow Copy service COM API

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-19 19:47

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 19:47

Reported

2024-06-19 19:50

Platform

win7-20240611-en

Max time kernel

143s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mstwain32.exe N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" C:\Windows\mstwain32.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\mstwain32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mstwain32.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\mstwain32.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
File opened for modification C:\Windows\mstwain32.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
File created C:\Windows\ntdtcstp.dll C:\Windows\mstwain32.exe N/A
File created C:\Windows\cmsetac.dll C:\Windows\mstwain32.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mstwain32.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mstwain32.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\DllHost.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1916 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe
PID 1916 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe
PID 1916 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe
PID 1916 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe
PID 1916 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe
PID 1916 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe
PID 1916 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe
PID 2968 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe C:\Windows\mstwain32.exe
PID 2968 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe C:\Windows\mstwain32.exe
PID 2968 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe C:\Windows\mstwain32.exe
PID 2968 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe C:\Windows\mstwain32.exe
PID 2968 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe C:\Windows\mstwain32.exe
PID 2968 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe C:\Windows\mstwain32.exe
PID 2968 wrote to memory of 812 N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe C:\Windows\mstwain32.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mstwain32.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\autorun.exe

"C:\Users\Admin\AppData\Local\Temp\autorun.exe"

C:\Windows\SysWOW64\DllHost.exe

C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\mstwain32.exe

"C:\Windows\mstwain32.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 fodite.no-ip.org udp

Files

\Users\Admin\AppData\Local\Temp\autorun.exe

MD5 7086393dbc0c7974014870a53922ef24
SHA1 33707b7a1010e47971c4166f72206617b2afcf18
SHA256 ea8208d5ba3f75e98719ee05543c54e1b0e44b34227be8465f9958105c893444
SHA512 860e9120acb10b1c44152a85b09dc0989e33ec626a7376a57da038226ab297c2876a275d3be873a588b1cc99dc48896e2345fb78bbf1cfb326a4fbf7426c12ed

memory/1916-12-0x00000000026A0000-0x00000000026F0000-memory.dmp

memory/1916-11-0x00000000026A0000-0x00000000026F0000-memory.dmp

memory/2968-14-0x0000000000400000-0x0000000000450000-memory.dmp

memory/1916-16-0x00000000005C0000-0x00000000005C2000-memory.dmp

memory/2392-17-0x00000000001B0000-0x00000000001B2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CS6.JPG.jpg

MD5 4af6515db1f86f108bd58d7d062db75d
SHA1 ec8bb3193ad27822a9ec3b5cd266c352b566940d
SHA256 b94564162040db03ecebfcc9909d243ed1fe2e923644a641d61abf3d49bc2b25
SHA512 8e567d6fa8e0edd2e19f5ac8cd4fd31b33febbfb0c6a6f014c2f8da8842ca44c1c38670847f061995192af7fd11d4330c184d338fcaae09b32c38bf318e7c94c

memory/2968-29-0x0000000003040000-0x0000000003090000-memory.dmp

memory/812-32-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2968-31-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2968-24-0x0000000002300000-0x0000000002310000-memory.dmp

memory/812-36-0x0000000002300000-0x000000000230E000-memory.dmp

memory/812-39-0x0000000000490000-0x0000000000498000-memory.dmp

memory/812-38-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-40-0x0000000002300000-0x000000000230E000-memory.dmp

memory/812-41-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-44-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-47-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-50-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-54-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-57-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-60-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-63-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-66-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-69-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-72-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-75-0x0000000000400000-0x0000000000450000-memory.dmp

memory/812-78-0x0000000000400000-0x0000000000450000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 19:47

Reported

2024-06-19 19:50

Platform

win10v2004-20240611-en

Max time kernel

143s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mstwain32.exe N/A

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\mstwain32.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstwain32 = "C:\\Windows\\mstwain32.exe" C:\Windows\mstwain32.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\mstwain32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mstwain32.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\mstwain32.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
File opened for modification C:\Windows\mstwain32.exe C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
File created C:\Windows\ntdtcstp.dll C:\Windows\mstwain32.exe N/A
File created C:\Windows\cmsetac.dll C:\Windows\mstwain32.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\autorun.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mstwain32.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\mstwain32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A
N/A N/A C:\Windows\mstwain32.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Windows\mstwain32.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\0034802f63e162402422a0ee421cdebb_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\autorun.exe

"C:\Users\Admin\AppData\Local\Temp\autorun.exe"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\mstwain32.exe

"C:\Windows\mstwain32.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 fodite.no-ip.org udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 fodite.no-ip.org udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 fodite.no-ip.org udp
US 8.8.8.8:53 fodite.no-ip.org udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 fodite.no-ip.org udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 fodite.no-ip.org udp
US 8.8.8.8:53 fodite.no-ip.org udp
US 8.8.8.8:53 fodite.no-ip.org udp

Files

C:\Users\Admin\AppData\Local\Temp\autorun.exe

MD5 7086393dbc0c7974014870a53922ef24
SHA1 33707b7a1010e47971c4166f72206617b2afcf18
SHA256 ea8208d5ba3f75e98719ee05543c54e1b0e44b34227be8465f9958105c893444
SHA512 860e9120acb10b1c44152a85b09dc0989e33ec626a7376a57da038226ab297c2876a275d3be873a588b1cc99dc48896e2345fb78bbf1cfb326a4fbf7426c12ed

memory/1432-11-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-23-0x0000000000400000-0x0000000000450000-memory.dmp

memory/1432-22-0x0000000002210000-0x0000000002211000-memory.dmp

memory/1432-20-0x0000000000400000-0x0000000000450000-memory.dmp

C:\Windows\ntdtcstp.dll

MD5 67587e25a971a141628d7f07bd40ffa0
SHA1 76fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256 e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA512 6e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350

memory/2112-33-0x00000000030E0000-0x00000000030EE000-memory.dmp

C:\Windows\cmsetac.dll

MD5 82fec52e81e7e581b08a3554d6021435
SHA1 48edfcb863bb59d65069fbb880a20eb1b719fd80
SHA256 2a94483dd1a3f59378de83c944f254e5243cd73d6a16c22d0fdcfc735856ca12
SHA512 13596cd5b2826edcf7cab589765edcfb0fe725ecaff9c3081fc9f6f445ebcb80765e526c0eeeebe4039676cd55620b329bb2d231f346b45260a514dc5db7cd40

memory/2112-35-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-37-0x00000000030E0000-0x00000000030EE000-memory.dmp

memory/2112-36-0x0000000000640000-0x0000000000648000-memory.dmp

memory/2112-38-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-41-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-44-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-47-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-50-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-53-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-56-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-59-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-62-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-65-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-68-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-71-0x0000000000400000-0x0000000000450000-memory.dmp

memory/2112-74-0x0000000000400000-0x0000000000450000-memory.dmp