Malware Analysis Report

2025-01-18 02:05

Sample ID 240613-je2prszbjd
Target a473c320f4526faa293f55a5dbf2a638_JaffaCakes118
SHA256 cb0da02521e07f7257ddd35e44595442b357971babf97a8bea2c0a5d4d6e1feb
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

cb0da02521e07f7257ddd35e44595442b357971babf97a8bea2c0a5d4d6e1feb

Threat Level: Shows suspicious behavior

The file a473c320f4526faa293f55a5dbf2a638_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Checks computer location settings

Unsigned PE

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 07:35

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 07:35

Reported

2024-06-13 07:38

Platform

win7-20240611-en

Max time kernel

121s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe"

Signatures

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 service.srvmd2.com udp

Files

memory/2448-1-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 07:35

Reported

2024-06-13 07:38

Platform

win10v2004-20240508-en

Max time kernel

51s

Max time network

58s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe N/A

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a473c320f4526faa293f55a5dbf2a638_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 service.srvmd2.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

N/A