Malware Analysis Report

2025-03-14 22:35

Sample ID 240406-1za6zscd2w
Target e3637ffd4e540d8e31562c241d544b70_JaffaCakes118
SHA256 a27ca0d5777adceb7e91d43dfbb8b3d67fc76afd584de1cc466266e46e12fce9
Tags
persistence upx
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

a27ca0d5777adceb7e91d43dfbb8b3d67fc76afd584de1cc466266e46e12fce9

Threat Level: Likely malicious

The file e3637ffd4e540d8e31562c241d544b70_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

persistence upx

Modifies AppInit DLL entries

Deletes itself

Loads dropped DLL

Executes dropped EXE

UPX packed file

Drops file in System32 directory

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-06 22:04

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-06 22:04

Reported

2024-04-06 22:07

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe"

Signatures

Modifies AppInit DLL entries

persistence

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\meyotmek.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\meyotme.dll C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\meyotmek.exe C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\meyotmek.exe C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe"

C:\Windows\SysWOW64\meyotmek.exe

C:\Windows\system32\meyotmek.exe ˜‰

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe.bat

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 26.73.42.20.in-addr.arpa udp

Files

memory/2204-0-0x0000000000400000-0x0000000000410000-memory.dmp

C:\Windows\SysWOW64\meyotmek.exe

MD5 e3637ffd4e540d8e31562c241d544b70
SHA1 554d09b670aa233912724c6014e4da282e44a881
SHA256 a27ca0d5777adceb7e91d43dfbb8b3d67fc76afd584de1cc466266e46e12fce9
SHA512 ff9e2453a99fa549c9e2f1fa9cd48cd9a537b3360db0bb0c5356659577cea0b540fddee4d0a157df7f55fd1791d23a39a01e787c4044bd4471a9da77c49f93a6

memory/2204-8-0x0000000000400000-0x0000000000410000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe.bat

MD5 5eb54437d0a0120f34ed415dd5bfb466
SHA1 e5c6e55a35fb92f0effa123e0d188d4f30608bc2
SHA256 ffea4c0018b629dd471747631164bdefedd7eb051efe25dcdbfdf0457bad1681
SHA512 9963a9c1565b08578ba38b6284839eea5553c39bca14e1b54240f076441ed6194880b71537872c6dad3d81a086d81f669e347f2a7034005d1f55dcda5af703d5

memory/4360-10-0x0000000000400000-0x0000000000410000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-06 22:04

Reported

2024-04-06 22:07

Platform

win7-20240221-en

Max time kernel

150s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe"

Signatures

Modifies AppInit DLL entries

persistence

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\meyotmek.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\meyotme.dll C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\meyotmek.exe C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\meyotmek.exe C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe"

C:\Windows\SysWOW64\meyotmek.exe

C:\Windows\system32\meyotmek.exe ˜‰

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe.bat

Network

N/A

Files

memory/1928-0-0x0000000000400000-0x0000000000410000-memory.dmp

\Windows\SysWOW64\meyotmek.exe

MD5 e3637ffd4e540d8e31562c241d544b70
SHA1 554d09b670aa233912724c6014e4da282e44a881
SHA256 a27ca0d5777adceb7e91d43dfbb8b3d67fc76afd584de1cc466266e46e12fce9
SHA512 ff9e2453a99fa549c9e2f1fa9cd48cd9a537b3360db0bb0c5356659577cea0b540fddee4d0a157df7f55fd1791d23a39a01e787c4044bd4471a9da77c49f93a6

memory/1928-4-0x0000000000030000-0x0000000000040000-memory.dmp

memory/2172-11-0x0000000000400000-0x0000000000410000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e3637ffd4e540d8e31562c241d544b70_JaffaCakes118.exe.bat

MD5 5eb54437d0a0120f34ed415dd5bfb466
SHA1 e5c6e55a35fb92f0effa123e0d188d4f30608bc2
SHA256 ffea4c0018b629dd471747631164bdefedd7eb051efe25dcdbfdf0457bad1681
SHA512 9963a9c1565b08578ba38b6284839eea5553c39bca14e1b54240f076441ed6194880b71537872c6dad3d81a086d81f669e347f2a7034005d1f55dcda5af703d5

memory/1928-19-0x0000000000400000-0x0000000000410000-memory.dmp