Malware Analysis Report

2024-11-15 05:40

Sample ID 240604-b4xhcagh9s
Target 934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118
SHA256 e9099f3d01aa4cf1c28017e5c71ba81d63e71c4bad5fd4cf541aa852b0f89a1d
Tags
discovery persistence spyware stealer upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

e9099f3d01aa4cf1c28017e5c71ba81d63e71c4bad5fd4cf541aa852b0f89a1d

Threat Level: Shows suspicious behavior

The file 934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery persistence spyware stealer upx

Reads user/profile data of web browsers

UPX packed file

Checks installed software on the system

Adds Run key to start application

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-04 01:42

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-04 01:42

Reported

2024-06-04 01:45

Platform

win7-20240220-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe"

Signatures

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe" C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe N/A

Checks installed software on the system

discovery

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe"

Network

Country Destination Domain Proto
DE 5.231.205.27:80 tcp
US 65.175.203.29:80 tcp
BY 134.17.146.30:80 tcp
UA 31.202.205.31:80 tcp
BR 177.61.25.38:80 tcp
ES 84.232.31.182:80 tcp
US 97.95.41.186:80 tcp
MD 188.237.2.190:80 tcp
UA 37.115.45.192:80 tcp
UA 93.77.231.193:80 tcp
UA 37.229.91.228:80 tcp
DE 80.90.18.232:80 tcp
US 207.255.92.233:80 tcp
UA 62.221.45.234:80 tcp
BR 200.205.130.234:80 tcp
UA 95.47.105.130:80 tcp
UA 5.248.235.130:80 tcp
BG 89.215.35.132:80 tcp
NL 188.213.93.133:80 tcp
US 73.194.199.137:80 tcp
MD 188.138.227.43:80 tcp
JP 126.2.230.55:80 tcp
UA 109.162.48.59:80 tcp
LV 62.85.51.60:80 tcp
BG 130.204.208.60:80 tcp
CH 5.153.124.147:80 tcp
CL 201.239.205.152:80 tcp
UA 77.122.93.155:80 tcp
UA 77.244.39.157:80 tcp
KG 95.87.88.159:80 tcp
NL 85.17.31.111:80 tcp
UA 95.135.63.113:80 tcp
HU 178.48.77.121:80 tcp
UA 5.248.102.121:80 tcp
JP 126.99.227.121:80 tcp
UA 5.248.224.25:80 tcp
IT 109.54.153.42:80 tcp
AR 190.19.154.43:80 tcp
US 198.161.133.61:80 tcp
UA 37.229.46.70:80 tcp

Files

memory/3040-0-0x0000000000400000-0x0000000001BD3000-memory.dmp

memory/3040-1-0x0000000000400000-0x0000000001BD3000-memory.dmp

memory/3040-2-0x0000000000400000-0x0000000001BD3000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-04 01:42

Reported

2024-06-04 01:45

Platform

win10v2004-20240426-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe"

Signatures

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe" C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe N/A

Checks installed software on the system

discovery

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\934fd737e1deb0a9d33c94acabe004ca_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
DE 5.231.205.27:80 tcp
US 65.175.203.29:80 tcp
BY 134.17.146.30:80 tcp
UA 31.202.205.31:80 tcp
BR 177.61.25.38:80 tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
ES 84.232.31.182:80 tcp
US 97.95.41.186:80 tcp
MD 188.237.2.190:80 tcp
UA 37.115.45.192:80 tcp
UA 93.77.231.193:80 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
UA 37.229.91.228:80 tcp
DE 80.90.18.232:80 tcp
US 207.255.92.233:80 tcp
UA 62.221.45.234:80 tcp
BR 200.205.130.234:80 tcp
UA 95.47.105.130:80 tcp
UA 5.248.235.130:80 tcp
BG 89.215.35.132:80 tcp
NL 188.213.93.133:80 tcp
US 73.194.199.137:80 tcp
US 52.111.229.43:443 tcp
MD 188.138.227.43:80 tcp
JP 126.2.230.55:80 tcp
UA 109.162.48.59:80 tcp
LV 62.85.51.60:80 tcp
BG 130.204.208.60:80 tcp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
CH 5.153.124.147:80 tcp
CL 201.239.205.152:80 tcp
UA 77.122.93.155:80 tcp
UA 77.244.39.157:80 tcp
KG 95.87.88.159:80 tcp
NL 85.17.31.111:80 tcp
UA 95.135.63.113:80 tcp
HU 178.48.77.121:80 tcp
UA 5.248.102.121:80 tcp
JP 126.99.227.121:80 tcp
US 8.8.8.8:53 7.173.189.20.in-addr.arpa udp
UA 5.248.224.25:80 tcp
IT 109.54.153.42:80 tcp
AR 190.19.154.43:80 tcp
US 198.161.133.61:80 tcp
UA 37.229.46.70:80 tcp

Files

memory/4604-0-0x0000000000400000-0x0000000001BD3000-memory.dmp

memory/4604-1-0x0000000000400000-0x0000000001BD3000-memory.dmp

memory/4604-3-0x0000000000400000-0x0000000001BD3000-memory.dmp