Malware Analysis Report

2024-11-15 05:41

Sample ID 240613-kavaka1cjg
Target a49d4eda9951b72159688d62f03b8e68_JaffaCakes118
SHA256 135c085e065014ac3bf51cc616ba5416c750ef700c5e162ca642041e9b092aac
Tags
upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

135c085e065014ac3bf51cc616ba5416c750ef700c5e162ca642041e9b092aac

Threat Level: Shows suspicious behavior

The file a49d4eda9951b72159688d62f03b8e68_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx

UPX packed file

Enumerates physical storage devices

Modifies Internet Explorer settings

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 08:24

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 08:24

Reported

2024-06-13 08:26

Platform

win10v2004-20240508-en

Max time kernel

141s

Max time network

51s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 tipp10.softonic.de udp
US 8.8.8.8:53 tipp10.softonic.de udp
US 8.8.8.8:53 tipp10.softonic.de udp

Files

memory/3756-0-0x0000000000400000-0x00000000008C1000-memory.dmp

memory/3756-1-0x0000000000400000-0x00000000008C1000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 08:24

Reported

2024-06-13 08:26

Platform

win7-20240419-en

Max time kernel

121s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a49d4eda9951b72159688d62f03b8e68_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 tipp10.softonic.de udp
US 8.8.8.8:53 tipp10.softonic.de udp
US 8.8.8.8:53 tipp10.softonic.de udp
US 8.8.8.8:53 tipp10.softonic.de udp

Files

memory/1200-0-0x0000000000400000-0x00000000008C1000-memory.dmp

memory/1200-1-0x0000000000400000-0x00000000008C1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\errorPageStrings[1]

MD5 e3e4a98353f119b80b323302f26b78fa
SHA1 20ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA256 9466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512 d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee

memory/1200-40-0x0000000000400000-0x00000000008C1000-memory.dmp

memory/1200-41-0x0000000000400000-0x00000000008C1000-memory.dmp