Malware Analysis Report

2025-03-14 22:13

Sample ID 240407-249qsahd99
Target e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118
SHA256 6b9b5bd2f3a090747c939a0198b26db87250ea669c330a1bfc1a5d42d1ccd3b1
Tags
persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

6b9b5bd2f3a090747c939a0198b26db87250ea669c330a1bfc1a5d42d1ccd3b1

Threat Level: Likely malicious

The file e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

persistence

Adds policy Run key to start application

Deletes itself

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

Suspicious use of UnmapMainImage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 23:09

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 23:09

Reported

2024-04-07 23:11

Platform

win7-20240221-en

Max time kernel

141s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\AppDataLow = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" C:\Windows\SysWOW64\svchost.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118.exe"

C:\Windows\SysWOW64\svchost.exe

svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.google.com udp
DE 172.217.16.196:80 www.google.com tcp
US 8.8.8.8:53 badbitches.ru udp

Files

memory/2092-0-0x0000000000400000-0x000000000040F000-memory.dmp

memory/2092-2-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2092-1-0x0000000000230000-0x0000000000239000-memory.dmp

memory/2092-3-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2944-4-0x00000000008F0000-0x00000000008F8000-memory.dmp

memory/2944-5-0x00000000008F0000-0x00000000008F8000-memory.dmp

memory/2944-6-0x00000000000C0000-0x00000000000C4000-memory.dmp

memory/2944-11-0x0000000000030000-0x0000000000039000-memory.dmp

memory/2944-7-0x0000000000030000-0x0000000000039000-memory.dmp

memory/2944-14-0x0000000000030000-0x0000000000039000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 23:09

Reported

2024-04-07 23:11

Platform

win10v2004-20231215-en

Max time kernel

141s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Windows\SysWOW64\svchost.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Google = "C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe" C:\Windows\SysWOW64\svchost.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\svchost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e612768fe268b1fa7eaabcb1768d96aa_JaffaCakes118.exe"

C:\Windows\SysWOW64\svchost.exe

svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
DE 172.217.16.196:80 www.google.com tcp
US 8.8.8.8:53 badbitches.ru udp
US 8.8.8.8:53 196.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp

Files

memory/5024-0-0x0000000000400000-0x000000000040F000-memory.dmp

memory/5024-1-0x0000000002160000-0x0000000002169000-memory.dmp

memory/5024-2-0x0000000000400000-0x0000000000409000-memory.dmp

memory/3972-3-0x0000000000E10000-0x0000000000E1E000-memory.dmp

memory/5024-4-0x0000000000400000-0x0000000000409000-memory.dmp

memory/3972-7-0x0000000000E10000-0x0000000000E1E000-memory.dmp

memory/3972-8-0x0000000000690000-0x0000000000694000-memory.dmp

memory/3972-9-0x00000000007E0000-0x00000000007E9000-memory.dmp

memory/3972-13-0x00000000007E0000-0x00000000007E9000-memory.dmp

memory/3972-16-0x00000000007E0000-0x00000000007E9000-memory.dmp