Malware Analysis Report

2025-01-18 00:33

Sample ID 240613-l9awmsybrj
Target a506d335be8a11afa44ed804421bcf24_JaffaCakes118
SHA256 258c5a2664ef56329604f271dd4b151ac810532de252574511398b14525476bd
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

258c5a2664ef56329604f271dd4b151ac810532de252574511398b14525476bd

Threat Level: Likely benign

The file a506d335be8a11afa44ed804421bcf24_JaffaCakes118 was found to be: Likely benign.

Malicious Activity Summary


Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-13 10:13

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 10:13

Reported

2024-06-13 10:16

Platform

win7-20240221-en

Max time kernel

117s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1E5A.tmp\1E5B.tmp\1E5C.bat C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c reg query "HKEY_CLASSES_ROOT\betternet\DefaultIcon" /VE

C:\Windows\system32\reg.exe

reg query "HKEY_CLASSES_ROOT\betternet\DefaultIcon" /VE

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\1E5A.tmp\1E5B.tmp\1E5C.bat

MD5 a03266a1e11e2095f0e8a5bc54e2769c
SHA1 bfe70e4923ef6c1d777b962020d342cd3a3f0ffb
SHA256 75b16b78b5addd5b51d548130f6ee545337205b30a8a50d6c0272e33caf0d546
SHA512 82b34edf4281631864b124a5131c1089edb06ee14a82bbe6daee29a106a7d95a2eaf618dfc3bb6370a88526537c053e69592cb487528eb5a1bf07e0891b9b4cf

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 10:13

Reported

2024-06-13 10:16

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

157s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe"

Signatures

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\DD8F.tmp\DD90.tmp\DD91.bat C:\Users\Admin\AppData\Local\Temp\a506d335be8a11afa44ed804421bcf24_JaffaCakes118.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c reg query "HKEY_CLASSES_ROOT\betternet\DefaultIcon" /VE

C:\Windows\system32\reg.exe

reg query "HKEY_CLASSES_ROOT\betternet\DefaultIcon" /VE

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3960,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\DD8F.tmp\DD90.tmp\DD91.bat

MD5 a03266a1e11e2095f0e8a5bc54e2769c
SHA1 bfe70e4923ef6c1d777b962020d342cd3a3f0ffb
SHA256 75b16b78b5addd5b51d548130f6ee545337205b30a8a50d6c0272e33caf0d546
SHA512 82b34edf4281631864b124a5131c1089edb06ee14a82bbe6daee29a106a7d95a2eaf618dfc3bb6370a88526537c053e69592cb487528eb5a1bf07e0891b9b4cf