Analysis Overview
SHA256
2382288ca3a82ded0c12db54d897a9af1a515e1e1a9a1ad7b12e3387bf571365
Threat Level: Shows suspicious behavior
The file 9180aef36b963e108158fe31b38628aa_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
Checks installed software on the system
Drops file in Windows directory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-06-03 10:50
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-03 10:50
Reported
2024-06-03 10:52
Platform
win7-20240221-en
Max time kernel
118s
Max time network
119s
Command Line
Signatures
Checks installed software on the system
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\DailyDose.job | C:\Users\Admin\AppData\Local\Temp\9180aef36b963e108158fe31b38628aa_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\9180aef36b963e108158fe31b38628aa_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\9180aef36b963e108158fe31b38628aa_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | parentmodel.biz | udp |
| US | 8.8.8.8:53 | allmodel-pro.com | udp |
| US | 204.11.56.48:80 | allmodel-pro.com | tcp |
| US | 8.8.8.8:53 | get-multiple.link | udp |
| US | 8.8.8.8:53 | moodmodel.biz | udp |
Files
memory/2080-0-0x0000000000020000-0x0000000000021000-memory.dmp
memory/2080-1-0x0000000000030000-0x0000000000031000-memory.dmp
memory/2080-2-0x00000000000F0000-0x00000000000F1000-memory.dmp
memory/2080-3-0x0000000000100000-0x0000000000101000-memory.dmp
memory/2080-4-0x0000000000110000-0x0000000000130000-memory.dmp
memory/2080-9-0x0000000000110000-0x0000000000130000-memory.dmp
memory/2080-5-0x00000000005D0000-0x00000000005FF000-memory.dmp
memory/2080-17-0x0000000000110000-0x0000000000130000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-03 10:50
Reported
2024-06-03 10:52
Platform
win10v2004-20240508-en
Max time kernel
132s
Max time network
101s
Command Line
Signatures
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\DailyDose.job | C:\Users\Admin\AppData\Local\Temp\9180aef36b963e108158fe31b38628aa_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\9180aef36b963e108158fe31b38628aa_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\9180aef36b963e108158fe31b38628aa_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | parentmodel.biz | udp |
| US | 8.8.8.8:53 | allmodel-pro.com | udp |
| US | 8.8.8.8:53 | get-multiple.link | udp |
| US | 8.8.8.8:53 | moodmodel.biz | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| NL | 23.62.61.75:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 75.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.90.14.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
Files
memory/1012-2-0x00000000015F0000-0x00000000015F1000-memory.dmp
memory/1012-1-0x00000000015E0000-0x00000000015E1000-memory.dmp
memory/1012-0-0x0000000000FF0000-0x0000000000FF1000-memory.dmp
memory/1012-4-0x0000000001600000-0x0000000001601000-memory.dmp
memory/1012-3-0x0000000001620000-0x0000000001640000-memory.dmp
memory/1012-6-0x0000000004C80000-0x0000000004CAF000-memory.dmp
memory/1012-9-0x0000000001620000-0x0000000001640000-memory.dmp
memory/1012-17-0x0000000001620000-0x0000000001640000-memory.dmp