Malware Analysis Report

2025-04-14 03:14

Sample ID 240612-y36e7asemq
Target a22d248f967f87d8b08d1fde206e125b_JaffaCakes118
SHA256 16da066037834fe3cbd12a245d7e472058701686b2c8e8a071b641fed62654d4
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

16da066037834fe3cbd12a245d7e472058701686b2c8e8a071b641fed62654d4

Threat Level: Shows suspicious behavior

The file a22d248f967f87d8b08d1fde206e125b_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Use of msiexec (install) with remote resource

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-12 20:19

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 20:19

Reported

2024-06-12 20:22

Platform

win7-20240611-en

Max time kernel

122s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"

Signatures

Use of msiexec (install) with remote resource

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A
N/A N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"

C:\Windows\SysWOW64\MSIEXEC.EXE

MSIEXEC.EXE /i "http://pliuht.cdnpckgs.eu/36175/cdn/silveroakcasino/Silver Oak Casino20130925051957.msi" DDC_DID=5233314 DDC_RTGURL=http://www.setupdlh.com/dl/TrackSetup/TrackSetup.aspx?DID=5233314 DDC_UPDATESTATUSURL=http://190.4.94.4:8080/silveroak/Lobby.WebServices/Installer.asmx SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 pliuht.cdnpckgs.eu udp

Files

C:\Users\Admin\AppData\Local\Temp\~7C24.tmp

MD5 ffd71a434574b9477855b3fcd440530d
SHA1 95bbba76c5ac3b7be8a7a763e055c271fb9365f2
SHA256 108aad68e0f007b448caad8ab0525ca4926060bb05eea4460c4af49afe624e95
SHA512 e258456acfaacc28af14d93f7a9107e4dac9936030bd549ce25be66f26099226b6ba3c185bd2691463379ae5674e2f518fd14c169de857eac5bd1edd4a887d8d

C:\Users\Admin\AppData\Local\Temp\_is7C46.tmp

MD5 da31bab6a073178acebc5d0fae83c5a5
SHA1 ee26a2f715f24a6545341e9f86d63dc23e22833e
SHA256 d41b1561b87345c64ab604ce185af557e71f80389032d23b57eed8edf80adcfd
SHA512 082b7a81f1bcc1b0680e8ba757124e1002e21d7dcad195631afa608c5be2c1764a51266bedbfb50a009b3ef8f0ccabb7bbde82424dc0ecfed933ae99e0539a18

C:\Users\Admin\AppData\Local\Temp\{19996200-C732-4A17-91C2-2AE88F0AEDF5}\0x0409.ini

MD5 be345d0260ae12c5f2f337b17e07c217
SHA1 0976ba0982fe34f1c35a0974f6178e15c238ed7b
SHA256 e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3
SHA512 77040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff

C:\Users\Admin\AppData\Local\Temp\{19996200-C732-4A17-91C2-2AE88F0AEDF5}\_ISMSIDEL.INI

MD5 db9af7503f195df96593ac42d5519075
SHA1 1b487531bad10f77750b8a50aca48593379e5f56
SHA256 0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA512 6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 20:19

Reported

2024-06-12 20:22

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"

Signatures

Use of msiexec (install) with remote resource

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A
N/A N/A C:\Windows\SysWOW64\MSIEXEC.EXE N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"

C:\Windows\SysWOW64\MSIEXEC.EXE

MSIEXEC.EXE /i "http://pliuht.cdnpckgs.eu/36175/cdn/silveroakcasino/Silver Oak Casino20130925051957.msi" DDC_DID=5233314 DDC_RTGURL=http://www.setupdlh.com/dl/TrackSetup/TrackSetup.aspx?DID=5233314 DDC_UPDATESTATUSURL=http://190.4.94.4:8080/silveroak/Lobby.WebServices/Installer.asmx SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="a22d248f967f87d8b08d1fde206e125b_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 pliuht.cdnpckgs.eu udp

Files

C:\Users\Admin\AppData\Local\Temp\~5EBC.tmp

MD5 ffd71a434574b9477855b3fcd440530d
SHA1 95bbba76c5ac3b7be8a7a763e055c271fb9365f2
SHA256 108aad68e0f007b448caad8ab0525ca4926060bb05eea4460c4af49afe624e95
SHA512 e258456acfaacc28af14d93f7a9107e4dac9936030bd549ce25be66f26099226b6ba3c185bd2691463379ae5674e2f518fd14c169de857eac5bd1edd4a887d8d

C:\Users\Admin\AppData\Local\Temp\_is5EBF.tmp

MD5 da31bab6a073178acebc5d0fae83c5a5
SHA1 ee26a2f715f24a6545341e9f86d63dc23e22833e
SHA256 d41b1561b87345c64ab604ce185af557e71f80389032d23b57eed8edf80adcfd
SHA512 082b7a81f1bcc1b0680e8ba757124e1002e21d7dcad195631afa608c5be2c1764a51266bedbfb50a009b3ef8f0ccabb7bbde82424dc0ecfed933ae99e0539a18

C:\Users\Admin\AppData\Local\Temp\{3D111050-F3F5-4865-9631-22B7FA6DF946}\0x0409.ini

MD5 be345d0260ae12c5f2f337b17e07c217
SHA1 0976ba0982fe34f1c35a0974f6178e15c238ed7b
SHA256 e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3
SHA512 77040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff

C:\Users\Admin\AppData\Local\Temp\{3D111050-F3F5-4865-9631-22B7FA6DF946}\_ISMSIDEL.INI

MD5 db9af7503f195df96593ac42d5519075
SHA1 1b487531bad10f77750b8a50aca48593379e5f56
SHA256 0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13
SHA512 6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b