Malware Analysis Report

2024-11-13 13:25

Sample ID 240614-b8ywza1arb
Target a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118
SHA256 55baa6a942f4d89ae349a3023c9ffda166adf443c1bf8d4c8ebba609f283b04d
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

55baa6a942f4d89ae349a3023c9ffda166adf443c1bf8d4c8ebba609f283b04d

Threat Level: Shows suspicious behavior

The file a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Loads dropped DLL

Checks installed software on the system

Maps connected drives based on registry

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-14 01:49

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 01:49

Reported

2024-06-14 01:52

Platform

win7-20240611-en

Max time kernel

117s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe N/A
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\_tin2308.bat"

Network

Country Destination Domain Proto
US 8.8.8.8:53 r1.getapplicationmy.info udp
US 8.8.8.8:53 c1.getapplicationmy.info udp
GB 94.229.72.121:80 c1.getapplicationmy.info tcp
US 207.244.76.132:80 r1.getapplicationmy.info tcp
US 8.8.8.8:53 survey-smiles.com udp
US 199.59.243.226:80 survey-smiles.com tcp
US 207.244.76.132:80 r1.getapplicationmy.info tcp
US 199.59.243.226:80 survey-smiles.com tcp

Files

\Users\Admin\AppData\Local\Temp\TsuECE91562.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

\Users\Admin\AppData\Local\Temp\{6F12638A-AC17-472C-A5C7-E435B4F1417C}\_Setup.dll

MD5 e991f79040937530c20ae0db2f74e4db
SHA1 6be9fe304687ac1c9ae4feae500eb7f683c27e86
SHA256 ade2b71ba0f45678470346f25803d1822ab7cf072b122b91f0a8feead799c87e
SHA512 fd069a1658006a4f0ada522bfe93a9a30f3ff058b54803556c8e6d0b3d1d3944072e2c2a5d0c5342986fc8af955abec3d974bea0a944e69e2c3e682954283790

\Users\Admin\AppData\Local\Temp\{6F12638A-AC17-472C-A5C7-E435B4F1417C}\Custom.dll

MD5 0842e2723fff1f80955c9dbd38019c75
SHA1 bea88c3fe74817b048951bd218e70d9dead617d9
SHA256 d71cea96d49b48f8702337d01681b2f144aca8acb56a699b9599106c11cc7458
SHA512 28acff8e01224291aa67f57b2d514db84a79fc2cf7ed28ed2e2cecbdf070fb3b1cf52e295a9412641422338f78d86fc6ea21d835a8de21565a8f53d24c604b02

C:\ProgramData\InstallMate\28ED126B\cfg\1.ini

MD5 3bc753af65be669459edb65a9a4e8233
SHA1 524a7147a29dba587410ccfc01f45476f735d900
SHA256 80fb3ecec2a20cbab68ca7b151772bd2920f27df65ed68140e1ddad5fd52b49e
SHA512 4070bc38c37f0e52ba804916cc68b9ce69a3b177b93a5e89244fa231a549dd71b5f87309965860f3fae50d0ec2510921d9d385f44419e9fa7e8697bf578d601e

C:\Users\Admin\AppData\Local\Temp\_tin2308.bat

MD5 8441db5615770b4178a57cdc5d2d3192
SHA1 99ff509b1898ea590e66853d2ab221225a8490b5
SHA256 7ab7213ae1559ac09037575e22afb963be1786db1ec38cd25cfccb3194e9c0bc
SHA512 5e27e1bb90d92cd467e56334d33a094c6ffb06a8cd82694bc89357cb6eba40cbae8053f43dd7ac671f1fdd55b4bf8152a90fcfe55ea729057f887cc1e222822f

C:\Users\Admin\AppData\Local\Temp\{6F12638A-AC17-472C-A5C7-E435B4F1417C}\Setup.ico

MD5 a339d8ea98aab39fe2017cc9c79174bd
SHA1 d746636bea67525deeb3d86392122f36c889fb41
SHA256 ce18c38f275cd7d8d704b774433fb80799c190350cf66de693fe5045c21713d7
SHA512 50ad6ff67c66cc1bfc4c15b70d8df29b5c3a89dd79b0aa9d8cf95d8491a032d37b728da29651f8ee21f3ec87b0c55e22f470b02817b1341be017b24e08ff57fe

C:\Users\Admin\AppData\Local\Temp\{6F12638A-AC17-472C-A5C7-E435B4F1417C}\Setup.exe

MD5 e717f6ce3a7429bfa6d7f3cf66737a4b
SHA1 01f4042589b4ed88c351ffeac256be7a9d884818
SHA256 7be720a73ba8b084702c89f64a9b295fad92545d6ba781072cc056823f9a7633
SHA512 65a9a27430811aa01b55cf365f8b7b9f03e70d32ec60e0706242bc568242bcd493999dc1b02d92bf0d01c0095c8c38d30f282a998cafb80e60ad07e0d875ce80

C:\Users\Admin\AppData\Local\Temp\{6F12638A-AC17-472C-A5C7-E435B4F1417C}\Readme.txt

MD5 59c049b7ee00ee5a8270ea536cdc40f9
SHA1 67aee7a6d0684be991a539b6a6658a6d7e950b33
SHA256 352428e1ccc4029aedcbc372fc60092228651e7606baf77abb3511abd163485e
SHA512 2b48efdf5db69a790bfe1d3a5be92430cd1ceef2297b11ccb0343ffffb587a66c1152a11f94344781c7b4e0bf8967d3f906d85ba422af5a14724cb8afd510e19

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 01:49

Reported

2024-06-14 01:52

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe"

Signatures

Checks installed software on the system

discovery

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe N/A
Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a79ded528d522abc1b375f5ed1b098e4_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 r1.getapplicationmy.info udp
US 8.8.8.8:53 c1.getapplicationmy.info udp
US 8.8.8.8:53 c2.getapplicationmy.info udp
US 8.8.8.8:53 r2.getapplicationmy.info udp
US 8.8.8.8:53 c1.getapplicationmy.info udp
US 8.8.8.8:53 c2.getapplicationmy.info udp

Files

C:\Users\Admin\AppData\Local\Temp\TsuEBAE7200.dll

MD5 af7ce801c8471c5cd19b366333c153c4
SHA1 4267749d020a362edbd25434ad65f98b073581f1
SHA256 cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA512 88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

C:\Users\Admin\AppData\Local\Temp\{8B5595AB-1648-495A-ABB1-5E6A50B6B75D}\_Setup.dll

MD5 e991f79040937530c20ae0db2f74e4db
SHA1 6be9fe304687ac1c9ae4feae500eb7f683c27e86
SHA256 ade2b71ba0f45678470346f25803d1822ab7cf072b122b91f0a8feead799c87e
SHA512 fd069a1658006a4f0ada522bfe93a9a30f3ff058b54803556c8e6d0b3d1d3944072e2c2a5d0c5342986fc8af955abec3d974bea0a944e69e2c3e682954283790

C:\Users\Admin\AppData\Local\Temp\{8B5595AB-1648-495A-ABB1-5E6A50B6B75D}\Custom.dll

MD5 0842e2723fff1f80955c9dbd38019c75
SHA1 bea88c3fe74817b048951bd218e70d9dead617d9
SHA256 d71cea96d49b48f8702337d01681b2f144aca8acb56a699b9599106c11cc7458
SHA512 28acff8e01224291aa67f57b2d514db84a79fc2cf7ed28ed2e2cecbdf070fb3b1cf52e295a9412641422338f78d86fc6ea21d835a8de21565a8f53d24c604b02