Malware Analysis Report

2024-11-13 13:27

Sample ID 240603-mtsl7abg61
Target 917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118
SHA256 a89dfe52ef044173c32f34b9db38a44eace4b3e5fa9946eae492be2dd8a24cce
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

a89dfe52ef044173c32f34b9db38a44eace4b3e5fa9946eae492be2dd8a24cce

Threat Level: Shows suspicious behavior

The file 917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Loads dropped DLL

Maps connected drives based on registry

Checks installed software on the system

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-03 10:45

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-03 10:45

Reported

2024-06-03 10:48

Platform

win7-20240221-en

Max time kernel

118s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 c1.downlloaddatamy.info udp
US 8.8.8.8:53 r1.getapplicationmy.info udp
US 8.8.8.8:53 c2.downlloaddatamy.info udp
GB 94.229.72.125:80 r1.getapplicationmy.info tcp
US 8.8.8.8:53 r2.getapplicationmy.info udp
GB 94.229.72.125:80 r2.getapplicationmy.info tcp

Files

\Users\Admin\AppData\Local\Temp\TsuC59FC0B6.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

\Users\Admin\AppData\Local\Temp\{6852AFC8-B62C-4483-A668-FE0EB3B18D3E}\_Setup.dll

MD5 be16f8d320da824f0db58ef6d75c75c6
SHA1 9c3993bbfa92ca6d5dc2b2721716f5040bb22d82
SHA256 a2879be2df754addca789fdd9d7d52dff21687414a2579ed8e05aaf9fb283822
SHA512 bbe5e522f5ef988d2ff216a5afc16fd5ee39244839f4ec6382f77d70df1dfe11e35cfad1ec4446ff06849c04c1e681bf312a9ea9623f96eac9e0677bab7eb1f0

\Users\Admin\AppData\Local\Temp\{6852AFC8-B62C-4483-A668-FE0EB3B18D3E}\Custom.dll

MD5 d2b596fa229e1b03704c9e9c3b4d4aa0
SHA1 19c57157c2e9b58037a7d2bca4909cbf125e9a23
SHA256 1bf33578f57d6436e916cc0734e8adc66a0e3c7ca5de1290601a73e3e362419d
SHA512 4e0d8ba8aea2c36ec79c86dcb6febe28ee0788d6a4d94231b5de10930e7fe0d285786bf6bfc3d85d8f1e83a4fb65f0f8a24e691c3298fce60ccef9a434a0d9c0

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-03 10:45

Reported

2024-06-03 10:48

Platform

win10v2004-20240508-en

Max time kernel

92s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe N/A
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\917d72bc7e58f5835eea14fb1ea97f75_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 r1.getapplicationmy.info udp
US 8.8.8.8:53 c1.downlloaddatamy.info udp
US 23.82.16.53:80 r1.getapplicationmy.info tcp
US 8.8.8.8:53 c2.downlloaddatamy.info udp
US 8.8.8.8:53 r2.getapplicationmy.info udp
US 23.82.16.55:80 r2.getapplicationmy.info tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 53.16.82.23.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 55.16.82.23.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 c1.downlloaddatamy.info udp
US 8.8.8.8:53 c2.downlloaddatamy.info udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 c1.downlloaddatamy.info udp
US 8.8.8.8:53 c2.downlloaddatamy.info udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\TsuC2F5EAAF.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

C:\Users\Admin\AppData\Local\Temp\{64947881-BA55-45B4-A75F-F277BF775A77}\_Setup.dll

MD5 be16f8d320da824f0db58ef6d75c75c6
SHA1 9c3993bbfa92ca6d5dc2b2721716f5040bb22d82
SHA256 a2879be2df754addca789fdd9d7d52dff21687414a2579ed8e05aaf9fb283822
SHA512 bbe5e522f5ef988d2ff216a5afc16fd5ee39244839f4ec6382f77d70df1dfe11e35cfad1ec4446ff06849c04c1e681bf312a9ea9623f96eac9e0677bab7eb1f0

C:\Users\Admin\AppData\Local\Temp\{64947881-BA55-45B4-A75F-F277BF775A77}\Custom.dll

MD5 d2b596fa229e1b03704c9e9c3b4d4aa0
SHA1 19c57157c2e9b58037a7d2bca4909cbf125e9a23
SHA256 1bf33578f57d6436e916cc0734e8adc66a0e3c7ca5de1290601a73e3e362419d
SHA512 4e0d8ba8aea2c36ec79c86dcb6febe28ee0788d6a4d94231b5de10930e7fe0d285786bf6bfc3d85d8f1e83a4fb65f0f8a24e691c3298fce60ccef9a434a0d9c0