Malware Analysis Report

2025-03-14 23:11

Sample ID 240407-acmcmaff46
Target e39b300faf337696bac224f77cbb4181_JaffaCakes118
SHA256 d5a34c9fd0b7f8fc33afbf0dc4f666454f31533d3a95a6e69de8eb2524003314
Tags
persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

d5a34c9fd0b7f8fc33afbf0dc4f666454f31533d3a95a6e69de8eb2524003314

Threat Level: Likely malicious

The file e39b300faf337696bac224f77cbb4181_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

persistence

Adds policy Run key to start application

Executes dropped EXE

Loads dropped DLL

Drops file in Windows directory

Unsigned PE

Modifies data under HKEY_USERS

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 00:04

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 00:04

Reported

2024-04-07 00:08

Platform

win7-20240221-en

Max time kernel

196s

Max time network

99s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Cisvc = "C:\\Windows\\cisvc.exe /waitservice" C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MqtgSVC = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mqtgsvc.exe /waitservice" C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\esentutl.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\cisvc.exe C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
File opened for modification C:\Windows\cisvc.exe C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Cisvc = "C:\\Users\\Admin\\LOCALS~1\\APPLIC~1\\cisvc.exe /waitservice" C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe"

C:\Users\Admin\AppData\Roaming\esentutl.exe

C:\Users\Admin\AppData\Roaming\esentutl.exe /waitservice

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.ramagerin.com udp

Files

C:\Windows\cisvc.exe

MD5 e39b300faf337696bac224f77cbb4181
SHA1 4c816524f29b0fbcbefdc2c0038b4dfbca5e4fd1
SHA256 d5a34c9fd0b7f8fc33afbf0dc4f666454f31533d3a95a6e69de8eb2524003314
SHA512 b10f414a735c25efcf56063ff20ce5e4740c9672b22dedbd678649633485fca764844ab5f9ba9b7a95aeecd1080851ef8cdefb1e3ab2fa8d551a62ebcfc4671f

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 00:04

Reported

2024-04-07 00:07

Platform

win10v2004-20240319-en

Max time kernel

147s

Max time network

171s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe"

Signatures

Adds policy Run key to start application

persistence
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Esent Utl = "C:\\Users\\Admin\\LOCALS~1\\APPLIC~1\\MICROS~1\\esentutl.exe /waitservice" C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\IEudinit = "C:\\Users\\Admin\\AppData\\Roaming\\ieudinit.exe /waitservice" C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ComRepl = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\comrepl.exe /waitservice" C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\.DEFAULT C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e39b300faf337696bac224f77cbb4181_JaffaCakes118.exe"

C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe

C:\Users\Admin\LOCALS~1\APPLIC~1\MICROS~1\sessmgr.exe /waitservice

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3772 --field-trial-handle=2284,i,13100272738549420251,6151825632958897606,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 www.ramagerin.com udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 11.2.37.23.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
DE 142.250.185.74:443 chromewebstore.googleapis.com tcp
GB 13.105.221.16:443 tcp
US 8.8.8.8:53 74.185.250.142.in-addr.arpa udp
US 8.8.8.8:53 www.ramagerin.com udp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\MICROS~1\esentutl.exe

MD5 e39b300faf337696bac224f77cbb4181
SHA1 4c816524f29b0fbcbefdc2c0038b4dfbca5e4fd1
SHA256 d5a34c9fd0b7f8fc33afbf0dc4f666454f31533d3a95a6e69de8eb2524003314
SHA512 b10f414a735c25efcf56063ff20ce5e4740c9672b22dedbd678649633485fca764844ab5f9ba9b7a95aeecd1080851ef8cdefb1e3ab2fa8d551a62ebcfc4671f