Malware Analysis Report

2024-11-13 13:25

Sample ID 240614-b8dwss1ane
Target a79c8925072a00b5700db17d9f7d3345_JaffaCakes118
SHA256 52f6082e0f763cbfa9803dd0c29b6e785f1e8ec64e47ba5c32014e467a49d312
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

52f6082e0f763cbfa9803dd0c29b6e785f1e8ec64e47ba5c32014e467a49d312

Threat Level: Shows suspicious behavior

The file a79c8925072a00b5700db17d9f7d3345_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Loads dropped DLL

Checks installed software on the system

Maps connected drives based on registry

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-14 01:48

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 01:48

Reported

2024-06-14 01:51

Platform

win7-20240221-en

Max time kernel

121s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 r1.getapplicationmy.info udp
US 8.8.8.8:53 c1.downlloaddatamy.info udp
US 8.8.8.8:53 c2.downlloaddatamy.info udp
US 207.244.76.132:80 r1.getapplicationmy.info tcp
US 8.8.8.8:53 survey-smiles.com udp
US 199.59.243.226:80 survey-smiles.com tcp

Files

\Users\Admin\AppData\Local\Temp\Tsu08005D13.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

\Users\Admin\AppData\Local\Temp\{3E4BF018-044C-4291-A07A-4C6EE5A8D2EE}\_Setup.dll

MD5 d551815ebe150faff90e2b7c5cbf8ae8
SHA1 d6ded104279e24ff90c70090b5112efc50757879
SHA256 523afe52c39237b2f68a28cbccf5f30e32b2d1a64053739a1cb092f7dd998790
SHA512 3de1b3d391c23f7c3d333c98258d56cbc9903f39ea04c962e7c35268716c448258c8c36f0cf5fa9500d1f90f4b51feabd0ac676ff73f98cb219533489e7e1185

\Users\Admin\AppData\Local\Temp\{3E4BF018-044C-4291-A07A-4C6EE5A8D2EE}\Custom.dll

MD5 734225cb2540b6ea71d2fe1ef8d42e1f
SHA1 078786a455720521670d54e1335eb54361cab21f
SHA256 13e1bd1730329a3d77c6d3fad3a46c042a786b243a6d567e6abf1b2e716d4dec
SHA512 4575274733b2aba223df2ae37cbaf3552f4f821dfb7089126ce16962442d2f10c1f1ea7fd60ff4232972e3d3fd9ce859f4ab2eea275ab59b4bd4426f9e201103

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 01:48

Reported

2024-06-14 01:51

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a79c8925072a00b5700db17d9f7d3345_JaffaCakes118.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4152,i,6166776566165096562,4582328833313060853,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 r1.getapplicationmy.info udp
US 8.8.8.8:53 c1.downlloaddatamy.info udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 r2.getapplicationmy.info udp
US 8.8.8.8:53 c2.downlloaddatamy.info udp
US 8.8.8.8:53 c1.downlloaddatamy.info udp

Files

C:\Users\Admin\AppData\Local\Temp\Tsu093AB26E.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

C:\Users\Admin\AppData\Local\Temp\{BD329B99-7317-4D4B-AFA0-3B3566D1B96F}\_Setup.dll

MD5 d551815ebe150faff90e2b7c5cbf8ae8
SHA1 d6ded104279e24ff90c70090b5112efc50757879
SHA256 523afe52c39237b2f68a28cbccf5f30e32b2d1a64053739a1cb092f7dd998790
SHA512 3de1b3d391c23f7c3d333c98258d56cbc9903f39ea04c962e7c35268716c448258c8c36f0cf5fa9500d1f90f4b51feabd0ac676ff73f98cb219533489e7e1185

C:\Users\Admin\AppData\Local\Temp\{BD329B99-7317-4D4B-AFA0-3B3566D1B96F}\Custom.dll

MD5 734225cb2540b6ea71d2fe1ef8d42e1f
SHA1 078786a455720521670d54e1335eb54361cab21f
SHA256 13e1bd1730329a3d77c6d3fad3a46c042a786b243a6d567e6abf1b2e716d4dec
SHA512 4575274733b2aba223df2ae37cbaf3552f4f821dfb7089126ce16962442d2f10c1f1ea7fd60ff4232972e3d3fd9ce859f4ab2eea275ab59b4bd4426f9e201103