Analysis Overview
SHA256
d5a34c9fd0b7f8fc33afbf0dc4f666454f31533d3a95a6e69de8eb2524003314
Threat Level: Likely malicious
The file e39b300faf337696bac224f77cbb4181_JaffaCakes118 was found to be: Likely malicious.
Malicious Activity Summary
Adds policy Run key to start application
Executes dropped EXE
Loads dropped DLL
Drops file in Windows directory
Unsigned PE
Modifies data under HKEY_USERS
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-07 00:04
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-07 00:04
Reported
2024-04-07 00:08
Platform
win7-20240221-en
Max time kernel
196s
Max time network
99s
Command Line
Signatures
Adds policy Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Cisvc = "C:\\Windows\\cisvc.exe /waitservice" | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MqtgSVC = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mqtgsvc.exe /waitservice" | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\esentutl.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\cisvc.exe | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| File opened for modification | C:\Windows\cisvc.exe | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Cisvc = "C:\\Users\\Admin\\LOCALS~1\\APPLIC~1\\cisvc.exe /waitservice" | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2412 wrote to memory of 2440 | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | C:\Users\Admin\AppData\Roaming\esentutl.exe |
| PID 2412 wrote to memory of 2440 | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | C:\Users\Admin\AppData\Roaming\esentutl.exe |
| PID 2412 wrote to memory of 2440 | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | C:\Users\Admin\AppData\Roaming\esentutl.exe |
| PID 2412 wrote to memory of 2440 | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | C:\Users\Admin\AppData\Roaming\esentutl.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe"
C:\Users\Admin\AppData\Roaming\esentutl.exe
C:\Users\Admin\AppData\Roaming\esentutl.exe /waitservice
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.ramagerin.com | udp |
Files
C:\Windows\cisvc.exe
| MD5 | e39b300faf337696bac224f77cbb4181 |
| SHA1 | 4c816524f29b0fbcbefdc2c0038b4dfbca5e4fd1 |
| SHA256 | d5a34c9fd0b7f8fc33afbf0dc4f666454f31533d3a95a6e69de8eb2524003314 |
| SHA512 | b10f414a735c25efcf56063ff20ce5e4740c9672b22dedbd678649633485fca764844ab5f9ba9b7a95aeecd1080851ef8cdefb1e3ab2fa8d551a62ebcfc4671f |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-07 00:04
Reported
2024-04-07 00:07
Platform
win10v2004-20240319-en
Max time kernel
147s
Max time network
171s
Command Line
Signatures
Adds policy Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Esent Utl = "C:\\Users\\Admin\\LOCALS~1\\APPLIC~1\\MICROS~1\\esentutl.exe /waitservice" | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IEudinit = "C:\\Users\\Admin\\AppData\\Roaming\\ieudinit.exe /waitservice" | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ComRepl = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\comrepl.exe /waitservice" | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4612 wrote to memory of 2960 | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe |
| PID 4612 wrote to memory of 2960 | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe |
| PID 4612 wrote to memory of 2960 | N/A | C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe | C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe"
C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe
C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe /waitservice
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3772 --field-trial-handle=2284,i,13100272738549420251,6151825632958897606,262144 --variations-seed-version /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.ramagerin.com | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.228.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.2.37.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| US | 8.8.8.8:53 | chromewebstore.googleapis.com | udp |
| DE | 142.250.185.74:443 | chromewebstore.googleapis.com | tcp |
| GB | 13.105.221.16:443 | tcp | |
| US | 8.8.8.8:53 | 74.185.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.ramagerin.com | udp |
| US | 8.8.8.8:53 | 105.83.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.73.42.20.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\MICROS~1\esentutl.exe
| MD5 | e39b300faf337696bac224f77cbb4181 |
| SHA1 | 4c816524f29b0fbcbefdc2c0038b4dfbca5e4fd1 |
| SHA256 | d5a34c9fd0b7f8fc33afbf0dc4f666454f31533d3a95a6e69de8eb2524003314 |
| SHA512 | b10f414a735c25efcf56063ff20ce5e4740c9672b22dedbd678649633485fca764844ab5f9ba9b7a95aeecd1080851ef8cdefb1e3ab2fa8d551a62ebcfc4671f |