Malware Analysis Report

2025-03-14 23:12

Sample ID 240407-aczyqaff59
Target e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118
SHA256 74a42ffbfcfe93903cae0dc8cdf2267171b8fd2efe82d14962cb2b7586126d7e
Tags
upx persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

74a42ffbfcfe93903cae0dc8cdf2267171b8fd2efe82d14962cb2b7586126d7e

Threat Level: Likely malicious

The file e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

upx persistence

Modifies AppInit DLL entries

Deletes itself

Loads dropped DLL

UPX packed file

Executes dropped EXE

Drops file in System32 directory

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 00:04

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 00:04

Reported

2024-04-07 00:07

Platform

win7-20240221-en

Max time kernel

150s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe"

Signatures

Modifies AppInit DLL entries

persistence

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\zesttnsk.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\zesttns.dll C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\zesttnsk.exe C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe N/A
File opened for modification C:\Windows\SysWOW64\zesttnsk.exe C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe"

C:\Windows\SysWOW64\zesttnsk.exe

C:\Windows\system32\zesttnsk.exe ˜‰

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe.bat

Network

N/A

Files

memory/460-0-0x0000000000400000-0x000000000040F000-memory.dmp

\Windows\SysWOW64\zesttnsk.exe

MD5 e39b7454e8ad23a60bd64e79a97b6229
SHA1 ecbfe1e129211aa5be50bb8861d0daff24e38f88
SHA256 74a42ffbfcfe93903cae0dc8cdf2267171b8fd2efe82d14962cb2b7586126d7e
SHA512 f279a23ca67165af46bbb611db93150cde62e2020700367e4ac1789f3d870b9dfb176e358db95f1f4fa7e850ccc40b22ddca7df7e14aa5a0a9e4fc5629036329

memory/460-10-0x0000000000030000-0x000000000003F000-memory.dmp

memory/2064-11-0x0000000000400000-0x000000000040F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe.bat

MD5 3ce37db588076badc1f567e5122401ef
SHA1 b97592cad2b384ccc5d2e17b09d9e88e33e8d629
SHA256 a62f6bc75ffd35418db1a0e68f60c4bd1fbe505b1ec322327325f6df5f4ea9aa
SHA512 51f5c2e000e6bf8d7248500d914dfeb921e8049b8458ae53cd003c82027776aa72cc0b3d2277bae0169687cab8b80ad3b35a9cacb0021a61043a49ac1eb26619

memory/460-19-0x0000000000400000-0x000000000040F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 00:04

Reported

2024-04-07 00:07

Platform

win10v2004-20240226-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe"

Signatures

Modifies AppInit DLL entries

persistence

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\zesttnsk.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\zesttnsk.exe C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\zesttns.dll C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe N/A
File created C:\Windows\SysWOW64\zesttnsk.exe C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe"

C:\Windows\SysWOW64\zesttnsk.exe

C:\Windows\system32\zesttnsk.exe ˜‰

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe.bat

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 150.1.37.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 169.253.116.51.in-addr.arpa udp

Files

memory/4864-0-0x0000000000400000-0x000000000040F000-memory.dmp

C:\Windows\SysWOW64\zesttnsk.exe

MD5 e39b7454e8ad23a60bd64e79a97b6229
SHA1 ecbfe1e129211aa5be50bb8861d0daff24e38f88
SHA256 74a42ffbfcfe93903cae0dc8cdf2267171b8fd2efe82d14962cb2b7586126d7e
SHA512 f279a23ca67165af46bbb611db93150cde62e2020700367e4ac1789f3d870b9dfb176e358db95f1f4fa7e850ccc40b22ddca7df7e14aa5a0a9e4fc5629036329

memory/4864-8-0x0000000000400000-0x000000000040F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e39b7454e8ad23a60bd64e79a97b6229_JaffaCakes118.exe.bat

MD5 3ce37db588076badc1f567e5122401ef
SHA1 b97592cad2b384ccc5d2e17b09d9e88e33e8d629
SHA256 a62f6bc75ffd35418db1a0e68f60c4bd1fbe505b1ec322327325f6df5f4ea9aa
SHA512 51f5c2e000e6bf8d7248500d914dfeb921e8049b8458ae53cd003c82027776aa72cc0b3d2277bae0169687cab8b80ad3b35a9cacb0021a61043a49ac1eb26619

memory/392-10-0x0000000000400000-0x000000000040F000-memory.dmp