Malware Analysis Report

2025-04-14 04:36

Sample ID 240613-ambzmswhma
Target a31c7ac1d7d255d252963d58189b225a_JaffaCakes118
SHA256 129dbfd7965d1c39f4d724d85f5beb36e5ab9f1c32234d3af4be905bd6278adb
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

129dbfd7965d1c39f4d724d85f5beb36e5ab9f1c32234d3af4be905bd6278adb

Threat Level: Likely benign

The file a31c7ac1d7d255d252963d58189b225a_JaffaCakes118 was found to be: Likely benign.

Malicious Activity Summary


Enumerates physical storage devices

Unsigned PE

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 00:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 00:19

Reported

2024-06-13 00:21

Platform

win7-20240611-en

Max time kernel

140s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe"

Signatures

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe"

Network

N/A

Files

memory/2160-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\InstallTmp\Config.txt

MD5 97e0900626e84a9c8a54325d2e71d056
SHA1 40accf98a478dfc4b4bdb1ada35a57095fb062ab
SHA256 6b181303ce57f62ecef04dcff7236d13637fa262428540747efe0ea3b5c461e9
SHA512 2ae036669647e380d1e3617f8f684a533f2afb868af7786464e68b8338743bb889031de562a5f4cfd88d4aa39639208b0007cc6299f551311f8d95f94b37c6d7

C:\Users\Admin\AppData\Local\Temp\InstallTmp\Readme.txt

MD5 660283212989828403126967ca7af80e
SHA1 d2390fbf12c5692f3046a75fa6d10582831e06e3
SHA256 2b883de63e0b3e25a31ee2813a1e868c6733439167ad77ae46284699e286a8e0
SHA512 01d49226a00e4b7abce0843f30dcd3e5815146c3a444fc1f8b3ad462c2749e152084c5a994a6eb6cd4abb1b316680c0a3d78f5fecfc896dec5e9a9af39a90754

memory/2160-182-0x0000000000400000-0x00000000004E8000-memory.dmp

memory/2160-184-0x00000000001B0000-0x00000000001B1000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 00:19

Reported

2024-06-13 00:21

Platform

win10v2004-20240508-en

Max time kernel

140s

Max time network

56s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe"

Signatures

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\IESettingSync C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a31c7ac1d7d255d252963d58189b225a_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

memory/2492-0-0x0000000002280000-0x0000000002281000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\InstallTmp\Config.txt

MD5 97e0900626e84a9c8a54325d2e71d056
SHA1 40accf98a478dfc4b4bdb1ada35a57095fb062ab
SHA256 6b181303ce57f62ecef04dcff7236d13637fa262428540747efe0ea3b5c461e9
SHA512 2ae036669647e380d1e3617f8f684a533f2afb868af7786464e68b8338743bb889031de562a5f4cfd88d4aa39639208b0007cc6299f551311f8d95f94b37c6d7

C:\Users\Admin\AppData\Local\Temp\InstallTmp\Readme.txt

MD5 660283212989828403126967ca7af80e
SHA1 d2390fbf12c5692f3046a75fa6d10582831e06e3
SHA256 2b883de63e0b3e25a31ee2813a1e868c6733439167ad77ae46284699e286a8e0
SHA512 01d49226a00e4b7abce0843f30dcd3e5815146c3a444fc1f8b3ad462c2749e152084c5a994a6eb6cd4abb1b316680c0a3d78f5fecfc896dec5e9a9af39a90754

memory/2492-181-0x0000000000400000-0x00000000004E8000-memory.dmp

memory/2492-183-0x0000000002280000-0x0000000002281000-memory.dmp