Malware Analysis Report

2025-08-06 00:20

Sample ID 240528-bcdwxshg56
Target 7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118
SHA256 5c68aacbfc2af4060a4f2aacb91941ba92325518b25ac15928c40b808a3fa2b5
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

5c68aacbfc2af4060a4f2aacb91941ba92325518b25ac15928c40b808a3fa2b5

Threat Level: Shows suspicious behavior

The file 7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Loads dropped DLL

Checks installed software on the system

Maps connected drives based on registry

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-28 00:59

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 00:59

Reported

2024-05-28 01:02

Platform

win7-20240419-en

Max time kernel

122s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe N/A
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 c1.getapplicationmy.info udp
US 8.8.8.8:53 r1.getapplicationmy.info udp
GB 94.229.72.125:80 r1.getapplicationmy.info tcp
GB 94.229.72.125:80 r1.getapplicationmy.info tcp
US 8.8.8.8:53 c2.getapplicationmy.info udp
US 8.8.8.8:53 r2.getapplicationmy.info udp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp

Files

\Users\Admin\AppData\Local\Temp\TsuA331EDA5.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

\Users\Admin\AppData\Local\Temp\{B798E219-CB2F-4D1B-AFF0-830D6C7BC0EF}\_Setup.dll

MD5 449e327ad7b62d3a446b1d5c97c76dea
SHA1 834bfc7bef4a08ddf4dfaf0e1a1f424b66456903
SHA256 2d0f7824d781e1372ea5a931dc5aba9a76164adfbf95d0a50a785403bc0a2e2f
SHA512 f99fbd4d5e2084a91fc21a2467a447350b14a61940c30482f67c28877863693c41f9e928a39752e7fecffc8bfba609b887ddaa5bbd70e1fec18483bf1e85e986

\Users\Admin\AppData\Local\Temp\{B798E219-CB2F-4D1B-AFF0-830D6C7BC0EF}\Custom.dll

MD5 71ffb31fe40a3f10913982ee89fa764c
SHA1 c17fa19479a7559f666a30d2932a2b9d540bd0ee
SHA256 b0e3f473796f639cab1354971740405bc39a096839ac53b4dfaae2c4acb71599
SHA512 6913a278fa38b9cef7b317ed7eab7773447dbc786d60531455c5cb28d82c677b472f2c50b3b9e1a8a71290757f064c828721633fb5f7bef47897dc740b1567ab

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 00:59

Reported

2024-05-28 01:02

Platform

win10v2004-20240226-en

Max time kernel

140s

Max time network

161s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe N/A
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\7b2a574fd7a6a6c41e47c318ed073c78_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\_tin1DE2.bat"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 c1.getapplicationmy.info udp
US 8.8.8.8:53 r1.getapplicationmy.info udp
GB 94.229.72.125:80 r1.getapplicationmy.info tcp
US 199.115.115.102:80 c1.getapplicationmy.info tcp
US 8.8.8.8:53 r2.getapplicationmy.info udp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
US 8.8.8.8:53 102.115.115.199.in-addr.arpa udp
US 8.8.8.8:53 125.72.229.94.in-addr.arpa udp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 168.117.168.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\TsuA93E62B2.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

C:\Users\Admin\AppData\Local\Temp\{BD0A179C-DD99-4B71-A99A-95BB66E9356A}\_Setup.dll

MD5 449e327ad7b62d3a446b1d5c97c76dea
SHA1 834bfc7bef4a08ddf4dfaf0e1a1f424b66456903
SHA256 2d0f7824d781e1372ea5a931dc5aba9a76164adfbf95d0a50a785403bc0a2e2f
SHA512 f99fbd4d5e2084a91fc21a2467a447350b14a61940c30482f67c28877863693c41f9e928a39752e7fecffc8bfba609b887ddaa5bbd70e1fec18483bf1e85e986

C:\Users\Admin\AppData\Local\Temp\{BD0A179C-DD99-4B71-A99A-95BB66E9356A}\Custom.dll

MD5 71ffb31fe40a3f10913982ee89fa764c
SHA1 c17fa19479a7559f666a30d2932a2b9d540bd0ee
SHA256 b0e3f473796f639cab1354971740405bc39a096839ac53b4dfaae2c4acb71599
SHA512 6913a278fa38b9cef7b317ed7eab7773447dbc786d60531455c5cb28d82c677b472f2c50b3b9e1a8a71290757f064c828721633fb5f7bef47897dc740b1567ab

C:\ProgramData\InstallMate\9DE7A619\cfg\1.ini

MD5 6cac7e488e6ac3437f911d2657c9a5e5
SHA1 a48c83c3a7d4412985454f094d380b151cf0d577
SHA256 04a18d450da39bb3b5f7a0f2cd37b577639c8c19069206cc8dab2b994984cc5c
SHA512 639d453d7a1da5d418334e6daaeb60f1926c74fcdb6a7dee325432e621c59f63de3f393ae4c44ecda7fdbe28724eabb6b083a28846697c0fb3a23451541280e4

C:\Users\Admin\AppData\Local\Temp\{BD0A179C-DD99-4B71-A99A-95BB66E9356A}\Readme.txt

MD5 5b1eb9140a2cb5c529dfe0b6e9eed4a5
SHA1 ef9524785109d63e850a6261a156ef9061d4735b
SHA256 467c79843850aca9b6d570920d456284a98591f04e18b0ae5d69cc57556a4250
SHA512 6af4ac13f0b3a431de1d56c4e4ffb639c1eac197505949566dbf79295df1f079e4365a85407ca4db6c64df29851f30cb8398e173c7c3557658ed0facf8833911

C:\Users\Admin\AppData\Local\Temp\{BD0A179C-DD99-4B71-A99A-95BB66E9356A}\Setup.exe

MD5 e717f6ce3a7429bfa6d7f3cf66737a4b
SHA1 01f4042589b4ed88c351ffeac256be7a9d884818
SHA256 7be720a73ba8b084702c89f64a9b295fad92545d6ba781072cc056823f9a7633
SHA512 65a9a27430811aa01b55cf365f8b7b9f03e70d32ec60e0706242bc568242bcd493999dc1b02d92bf0d01c0095c8c38d30f282a998cafb80e60ad07e0d875ce80

C:\Users\Admin\AppData\Local\Temp\{BD0A179C-DD99-4B71-A99A-95BB66E9356A}\Setup.ico

MD5 9c0ef57c15d70cd0d9227c923c29b770
SHA1 f89d16da63c5c25bf727ab2a2aec7ec24df1cfea
SHA256 cab6153481054dc90653578d1825ca1c75797a70ac4310d27fa155961f4547fe
SHA512 c6be73c49dc9e2c36cd5131feff909a2145ab0dc05227b38e842747ba128f4f2b70dc14c01ffa32239c4db0f26d108bf26757c8324b386f99686c2026426a74c

C:\Users\Admin\AppData\Local\Temp\_tin1DE2.bat

MD5 578cae0edee1e15618fe273832521e9a
SHA1 e9d15fa03357f2d27fb029381c19fc3a5b1ec413
SHA256 28f9e1ac1b8ad9906847ddf08dde6cb3c18a68594f0a835d96e28b80741f277a
SHA512 4aef890450ab22ddb6f06ee2741b42fcede5e8b867b1d54f0d759ed51da704c9aef35458eaf327bd5f1abdc2e8289566dba090a7c6e702196b2061c1d2799a0a