Malware Analysis Report

2025-01-22 12:43

Sample ID 240622-1gd5xsverd
Target 03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118
SHA256 45208d059a0bd429ad661a06206d5e077fcaade73c9a04810c73441e1780add6
Tags
aspackv2 spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

45208d059a0bd429ad661a06206d5e077fcaade73c9a04810c73441e1780add6

Threat Level: Likely malicious

The file 03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

aspackv2 spyware stealer

Drops file in Drivers directory

Loads dropped DLL

Reads user/profile data of web browsers

ASPack v2.12-2.42

Drops file in System32 directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-22 21:36

Signatures

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-22 21:36

Reported

2024-06-22 21:39

Platform

win7-20240220-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\Hosts C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\788550483772.sys C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe"

Network

N/A

Files

memory/2872-1-0x0000000000400000-0x00000000004B2000-memory.dmp

\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe1026207\krnln.fnr

MD5 d586c9058d124d871a6df53374afe82f
SHA1 2ded584a682c8d3371bfbaec8f4ea218ab94a05b
SHA256 22a1b0a9fec6402af2308f34c3226314aa61f51c0e968c030e08e91b14fa432c
SHA512 dc95e34b83768180ecc5cc19b1c99af56843b0aea3d60d12038c21485ee6786fa0ca213cfb1c7b27a6d4a003340fc04448d6eacc0575df973f748c924af5c81b

memory/2872-4-0x0000000001E60000-0x0000000001FEA000-memory.dmp

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].url

MD5 3c12b619f5b9575ba2944b7ca4678929
SHA1 fa6792387198c2d93de2619059efc5206341198d
SHA256 add35880f84004b1422166fe432267249036168ddcf0185481769021980b300a
SHA512 d1e370e03affc9acfa770edc5959bc8009d15d026e4f4cd45314c8e213e371b765828f7a4921169c62c6848dcdbda38311620f4b7af922479b923a6ef12a355d

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url

MD5 7c8c531ff6a158742da186b1fad6e00e
SHA1 98d4551e0d6ac034838a17437640f3335edfaa86
SHA256 00ddbc71282fdbf74b8a02cc75b2c3d66529fe7664c148cc0ca79576a883c501
SHA512 1788173da6e9cf7e5421c02854ca9122d0825927f33fc64bafb76377ee80c0e1a8112c36ee40b1cbce86e121f864777e8ddf9aecd282f3cc82b70e12cc904805

memory/2872-40-0x0000000002200000-0x0000000002210000-memory.dmp

memory/2872-46-0x0000000001E60000-0x0000000001FEA000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-22 21:36

Reported

2024-06-22 21:39

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\Hosts C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\788550483772.sys C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe"

Network

Files

memory/2220-0-0x0000000000400000-0x00000000004B2000-memory.dmp

memory/2220-8-0x0000000002390000-0x000000000251A000-memory.dmp

memory/2220-7-0x0000000002390000-0x000000000251A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\03ef2de4eea1d9721aa44e54c86b534c_JaffaCakes118.exe1026207\krnln.fnr

MD5 d586c9058d124d871a6df53374afe82f
SHA1 2ded584a682c8d3371bfbaec8f4ea218ab94a05b
SHA256 22a1b0a9fec6402af2308f34c3226314aa61f51c0e968c030e08e91b14fa432c
SHA512 dc95e34b83768180ecc5cc19b1c99af56843b0aea3d60d12038c21485ee6786fa0ca213cfb1c7b27a6d4a003340fc04448d6eacc0575df973f748c924af5c81b

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url

MD5 f9fc3e4f710ea6068eccca29ed784970
SHA1 eb6f961e7102e3aef227b204ff4dd9563f745812
SHA256 1c12badabe490d7c3d63bb0187965344ce0ed923eab707e446900a9b98913fcb
SHA512 b2d0db7a2c4b4d4e53a8daf2caff6a0ea826133038380e5dcf8c6493417f2884ecd61f047798189a3cff13cca3b9dbe99e5a501ce5de10488b2a337389b019ed

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].url

MD5 514d1b59ae8925c5edea3c446ce588dd
SHA1 60dd675b65c7ffaac6ca731dba265a6f316a6f75
SHA256 6bbfe9e113e075b646ae49400657b8bb20cbab06854b38bf007ac6e15cd7b773
SHA512 5bf3d0f1715b445852ad184907d2161967d51cb8fe9673330438d8705502bc63e263222c43839140c613a427b0b58b297e522b3953c2543453625e01b8017253

memory/2220-50-0x0000000002390000-0x000000000251A000-memory.dmp