Malware Analysis Report

2024-09-11 10:04

Sample ID 240404-kvtvjabd96
Target b420526c88a85e4f5b669774b6d15f15_JaffaCakes118
SHA256 e1a132ff0f8ea6217593ad90da947a1662b8a2130d5953328e3062c57fd74375
Tags
limerat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e1a132ff0f8ea6217593ad90da947a1662b8a2130d5953328e3062c57fd74375

Threat Level: Known bad

The file b420526c88a85e4f5b669774b6d15f15_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

limerat

Limerat family

Unsigned PE

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-04 08:55

Signatures

Limerat family

limerat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-04 08:55

Reported

2024-04-04 08:58

Platform

win7-20240221-en

Max time kernel

122s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b420526c88a85e4f5b669774b6d15f15_JaffaCakes118.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b420526c88a85e4f5b669774b6d15f15_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b420526c88a85e4f5b669774b6d15f15_JaffaCakes118.exe"

Network

N/A

Files

memory/1880-0-0x0000000074780000-0x0000000074D2B000-memory.dmp

memory/1880-1-0x0000000074780000-0x0000000074D2B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-04 08:55

Reported

2024-04-04 08:58

Platform

win10v2004-20240319-en

Max time kernel

139s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b420526c88a85e4f5b669774b6d15f15_JaffaCakes118.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b420526c88a85e4f5b669774b6d15f15_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\b420526c88a85e4f5b669774b6d15f15_JaffaCakes118.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4248 --field-trial-handle=2224,i,17688331074622862378,73816879873678745,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 202.110.86.104.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 167.161.23.2.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
IE 94.245.104.56:443 tcp
GB 172.166.92.12:443 tcp
GB 51.140.242.104:443 tcp
NL 142.250.179.138:443 tcp
NL 142.250.179.138:443 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 24.66.18.2.in-addr.arpa udp
GB 13.105.221.16:443 tcp
US 8.8.8.8:53 218.110.86.104.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/2388-0-0x0000000074D20000-0x00000000752D1000-memory.dmp

memory/2388-1-0x0000000074D20000-0x00000000752D1000-memory.dmp

memory/2388-2-0x0000000001180000-0x0000000001190000-memory.dmp

memory/2388-4-0x0000000074D20000-0x00000000752D1000-memory.dmp