Malware Analysis Report

2025-01-18 00:40

Sample ID 240613-mbyeqavbjg
Target a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118
SHA256 838d9099121e96aab641134ec325cea78c3375d36dc05e37e307cf9dc0e8a948
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

838d9099121e96aab641134ec325cea78c3375d36dc05e37e307cf9dc0e8a948

Threat Level: Shows suspicious behavior

The file a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary


Loads dropped DLL

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 10:18

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 10:18

Reported

2024-06-13 10:20

Platform

win7-20240611-en

Max time kernel

120s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 r1.reportbox3.info udp
US 8.8.8.8:53 c1.reportbox3.info udp
US 8.8.8.8:53 r2.reportbox3.info udp
US 8.8.8.8:53 c2.reportbox3.info udp

Files

\Users\Admin\AppData\Local\Temp\Tsu0D58B806.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

\Users\Admin\AppData\Local\Temp\{6AC60C94-3814-49AA-AB41-7036B1252E62}\_Setup.dll

MD5 38a02e049e3d6edf5833e249563fc50c
SHA1 de7da46b36c89ac54cd40bb6f8343374ce3a08b7
SHA256 fbaea13a4ed643447b49014606bb504ff3cf79c021bc7aac4a017d515215eea2
SHA512 c3dbf9e06d1b6f6da5ad537615ea35de5b0759e1636691f97038ba88b8fa022c23903097477bff29167d8d1d203b706056d4b32b5c65fc018be4db5b9e792005

\Users\Admin\AppData\Local\Temp\{6AC60C94-3814-49AA-AB41-7036B1252E62}\Custom.dll

MD5 fb2321c4d34033bf5ca3ccf8f14921ba
SHA1 e55c63d6690c4786e5bbe98065ed3ccc654ed5e1
SHA256 3d6536036244431d9f1510a03d95d8cf96314fdbed99a2f916a9f16edd658292
SHA512 44707deed812a166d9d19f1cfed7080e4a35e71d9beef569824b0e8fa929eb36fe52f28b36647866182508ea4f72cb6adb9718e65c18c06989e9cfa7c8960c8d

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 10:18

Reported

2024-06-13 10:20

Platform

win10v2004-20240226-en

Max time kernel

142s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a50b42fdaeec7d4c7189698cf502ea50_JaffaCakes118.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 105.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 c1.reportbox3.info udp
US 8.8.8.8:53 r1.reportbox3.info udp
US 8.8.8.8:53 c2.reportbox3.info udp
US 8.8.8.8:53 r2.reportbox3.info udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
GB 172.217.169.74:443 tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 c1.reportbox3.info udp
US 8.8.8.8:53 c2.reportbox3.info udp
US 8.8.8.8:53 c1.reportbox3.info udp
US 8.8.8.8:53 c2.reportbox3.info udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 145.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 91.65.42.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\Tsu0FF4D21E.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

C:\Users\Admin\AppData\Local\Temp\{F979E87B-DBD5-4371-A19A-93F7229ACA8D}\_Setup.dll

MD5 38a02e049e3d6edf5833e249563fc50c
SHA1 de7da46b36c89ac54cd40bb6f8343374ce3a08b7
SHA256 fbaea13a4ed643447b49014606bb504ff3cf79c021bc7aac4a017d515215eea2
SHA512 c3dbf9e06d1b6f6da5ad537615ea35de5b0759e1636691f97038ba88b8fa022c23903097477bff29167d8d1d203b706056d4b32b5c65fc018be4db5b9e792005

C:\Users\Admin\AppData\Local\Temp\{F979E87B-DBD5-4371-A19A-93F7229ACA8D}\Custom.dll

MD5 fb2321c4d34033bf5ca3ccf8f14921ba
SHA1 e55c63d6690c4786e5bbe98065ed3ccc654ed5e1
SHA256 3d6536036244431d9f1510a03d95d8cf96314fdbed99a2f916a9f16edd658292
SHA512 44707deed812a166d9d19f1cfed7080e4a35e71d9beef569824b0e8fa929eb36fe52f28b36647866182508ea4f72cb6adb9718e65c18c06989e9cfa7c8960c8d