Malware Analysis Report

2025-08-11 06:08

Sample ID 240527-w6p69see63
Target 7a19c0144f638798fc7062ce29eec290_JaffaCakes118
SHA256 1f96f4332c601a51adba3f99259e6ffcc5befd524896296045711da4b5796d86
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

1f96f4332c601a51adba3f99259e6ffcc5befd524896296045711da4b5796d86

Threat Level: Shows suspicious behavior

The file 7a19c0144f638798fc7062ce29eec290_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Loads dropped DLL

Checks installed software on the system

Maps connected drives based on registry

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-27 18:32

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-27 18:32

Reported

2024-05-27 18:34

Platform

win7-20240221-en

Max time kernel

119s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe N/A
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 r1.getapplicationmy.info udp
US 8.8.8.8:53 c1.getapplicationmy.info udp
GB 94.229.72.120:80 c1.getapplicationmy.info tcp
US 199.115.115.102:80 r1.getapplicationmy.info tcp
US 8.8.8.8:53 c2.getapplicationmy.info udp
GB 94.229.72.120:80 c2.getapplicationmy.info tcp
US 8.8.8.8:53 r2.getapplicationmy.info udp
US 199.115.115.102:80 r2.getapplicationmy.info tcp
GB 94.229.72.120:80 c2.getapplicationmy.info tcp
GB 94.229.72.120:80 c2.getapplicationmy.info tcp
GB 94.229.72.120:80 c2.getapplicationmy.info tcp
GB 94.229.72.120:80 c2.getapplicationmy.info tcp

Files

\Users\Admin\AppData\Local\Temp\TsuC45BF73A.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

\Users\Admin\AppData\Local\Temp\{75EED5C0-8A5F-44DE-A635-C27DAE0DF736}\_Setup.dll

MD5 204a2b4cd7d5022c92d0d15d33051795
SHA1 7742a0d36b16c07dde8c2d29b8d2bbeed17130d2
SHA256 d6267d0770d1e2ae443e2217ed5f326cf17a0a67454783af4e109db5f040fe85
SHA512 b4aeda6dbb92e070a5d650dfe28f1c0fac5125d9bc1603c8321124aa335d4842da774d68dc6c0f6415579b337a3527d991bc444e5a6167c672f8920759de86e3

\Users\Admin\AppData\Local\Temp\{75EED5C0-8A5F-44DE-A635-C27DAE0DF736}\Custom.dll

MD5 ed92e425cd374788afede25d2dd9d84a
SHA1 666fcb0dc635af7ba075e48c8f8c72a16dd30a67
SHA256 a50e3750c29b54f7b304064bb843972dba4094ee9ceef4e6942c61d2a5690d46
SHA512 8afa88d37eaef17822c7fe9285f30d4766af63cabf0dea05b5e74b5a2cd5dfced7729418d42979a7ab006cda6a17731c59b93400c4f2be3f3b59e81e2800687d

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-27 18:32

Reported

2024-05-27 18:34

Platform

win10v2004-20240508-en

Max time kernel

136s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe N/A
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\7a19c0144f638798fc7062ce29eec290_JaffaCakes118.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4116 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 c1.getapplicationmy.info udp
US 8.8.8.8:53 r1.getapplicationmy.info udp
GB 94.229.72.120:80 c1.getapplicationmy.info tcp
US 8.8.8.8:53 c2.getapplicationmy.info udp
US 199.115.115.102:80 r1.getapplicationmy.info tcp
GB 94.229.72.120:80 c2.getapplicationmy.info tcp
US 8.8.8.8:53 r2.getapplicationmy.info udp
GB 94.229.72.120:80 r2.getapplicationmy.info tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 120.72.229.94.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 102.115.115.199.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
NL 23.62.61.155:443 www.bing.com tcp
US 8.8.8.8:53 155.61.62.23.in-addr.arpa udp
GB 94.229.72.120:80 r2.getapplicationmy.info tcp
GB 94.229.72.120:80 r2.getapplicationmy.info tcp
GB 94.229.72.120:80 r2.getapplicationmy.info tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
GB 94.229.72.120:80 r2.getapplicationmy.info tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\TsuC48B14EB.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

C:\Users\Admin\AppData\Local\Temp\{85043CEF-11ED-4723-A5C8-59CF5EE71E19}\_Setup.dll

MD5 204a2b4cd7d5022c92d0d15d33051795
SHA1 7742a0d36b16c07dde8c2d29b8d2bbeed17130d2
SHA256 d6267d0770d1e2ae443e2217ed5f326cf17a0a67454783af4e109db5f040fe85
SHA512 b4aeda6dbb92e070a5d650dfe28f1c0fac5125d9bc1603c8321124aa335d4842da774d68dc6c0f6415579b337a3527d991bc444e5a6167c672f8920759de86e3

C:\Users\Admin\AppData\Local\Temp\{85043CEF-11ED-4723-A5C8-59CF5EE71E19}\Custom.dll

MD5 ed92e425cd374788afede25d2dd9d84a
SHA1 666fcb0dc635af7ba075e48c8f8c72a16dd30a67
SHA256 a50e3750c29b54f7b304064bb843972dba4094ee9ceef4e6942c61d2a5690d46
SHA512 8afa88d37eaef17822c7fe9285f30d4766af63cabf0dea05b5e74b5a2cd5dfced7729418d42979a7ab006cda6a17731c59b93400c4f2be3f3b59e81e2800687d