Malware Analysis Report

2025-01-18 02:04

Sample ID 240613-jdg9qszame
Target a4714a863be37047b3443ab088843078_JaffaCakes118
SHA256 e4346f398339217ea84bbb5652f362223aa0657104d10f178b45ed294a10644d
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

e4346f398339217ea84bbb5652f362223aa0657104d10f178b45ed294a10644d

Threat Level: Shows suspicious behavior

The file a4714a863be37047b3443ab088843078_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Checks computer location settings

Unsigned PE

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 07:33

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 07:33

Reported

2024-06-13 07:35

Platform

win7-20240508-en

Max time kernel

122s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe"

Signatures

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 service.srvmd2.com udp

Files

memory/2056-1-0x0000000001E70000-0x0000000001E71000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 07:33

Reported

2024-06-13 07:35

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe N/A

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a4714a863be37047b3443ab088843078_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 service.srvmd2.com udp

Files

N/A