Malware Analysis Report

2025-01-22 12:40

Sample ID 240622-x5ws4avhjn
Target 039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118
SHA256 1aab4f161deb04f4628ec6a5dfa0c2f42531dd378773ee371eb3f704e3665813
Tags
spyware stealer upx aspackv2
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

1aab4f161deb04f4628ec6a5dfa0c2f42531dd378773ee371eb3f704e3665813

Threat Level: Likely malicious

The file 039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118 was found to be: Likely malicious.

Malicious Activity Summary

spyware stealer upx aspackv2

Drops file in Drivers directory

Loads dropped DLL

Reads user/profile data of web browsers

ASPack v2.12-2.42

ACProtect 1.3x - 1.4x DLL software

UPX packed file

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-22 19:26

Signatures

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-22 19:26

Reported

2024-06-22 19:29

Platform

win10v2004-20240611-en

Max time kernel

141s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\mHost.dll C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\Hosts.dll C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\Hosts.dll\ C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\Hosts C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.97:443 www.bing.com tcp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp

Files

memory/2028-0-0x0000000000400000-0x00000000004C9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe1026932\krnln.fnr

MD5 311cd74122940df51a21b7639446083c
SHA1 3c3601d68692c93ba27c5f677d73c07e0e4253ef
SHA256 5d2b7e8da8c8367207afc00459503f23d7734399bf6ba7f86c4498e321fd48ea
SHA512 a5e038337ba8293f715621a2e171f2a439b89a66b230c2b5db1b2dd8e44c46c5bcfe1652d731b4982ea1323fe517a81f0b340d8df7e5667ec24982f84ec709e9

memory/2028-8-0x0000000002390000-0x0000000002544000-memory.dmp

memory/2028-9-0x0000000002390000-0x0000000002544000-memory.dmp

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].url

MD5 514d1b59ae8925c5edea3c446ce588dd
SHA1 60dd675b65c7ffaac6ca731dba265a6f316a6f75
SHA256 6bbfe9e113e075b646ae49400657b8bb20cbab06854b38bf007ac6e15cd7b773
SHA512 5bf3d0f1715b445852ad184907d2161967d51cb8fe9673330438d8705502bc63e263222c43839140c613a427b0b58b297e522b3953c2543453625e01b8017253

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url

MD5 f9fc3e4f710ea6068eccca29ed784970
SHA1 eb6f961e7102e3aef227b204ff4dd9563f745812
SHA256 1c12badabe490d7c3d63bb0187965344ce0ed923eab707e446900a9b98913fcb
SHA512 b2d0db7a2c4b4d4e53a8daf2caff6a0ea826133038380e5dcf8c6493417f2884ecd61f047798189a3cff13cca3b9dbe99e5a501ce5de10488b2a337389b019ed

C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe1026932\iext.fnr

MD5 b8546d0c3a88077599a4c52eca3d5a97
SHA1 1470a09a892f798b75c10c0b165bd3e65ea432f8
SHA256 c0d69587de55c79f0f4ea69e9fa62d35fb595a3fda406ed243035c5639158816
SHA512 70fb099df16f3575604c4114e48ac54a8ec9ebd7b6008b7f5411b3b3a77ed6847c703a1fd0d00b145c3f41d7529e08ebd37791b261f2cd6aaaa51db21d121b07

memory/2028-44-0x0000000010000000-0x0000000010048000-memory.dmp

memory/2028-49-0x0000000010000000-0x0000000010048000-memory.dmp

memory/2028-51-0x0000000002390000-0x0000000002544000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-22 19:26

Reported

2024-06-22 19:29

Platform

win7-20240611-en

Max time kernel

141s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\drivers\etc\Hosts C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\mHost.dll C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\Hosts.dll C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
File opened for modification C:\Windows\system32\drivers\etc\Hosts.dll\ C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe"

Network

N/A

Files

memory/2208-0-0x0000000000400000-0x00000000004C9000-memory.dmp

\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe1026932\krnln.fnr

MD5 311cd74122940df51a21b7639446083c
SHA1 3c3601d68692c93ba27c5f677d73c07e0e4253ef
SHA256 5d2b7e8da8c8367207afc00459503f23d7734399bf6ba7f86c4498e321fd48ea
SHA512 a5e038337ba8293f715621a2e171f2a439b89a66b230c2b5db1b2dd8e44c46c5bcfe1652d731b4982ea1323fe517a81f0b340d8df7e5667ec24982f84ec709e9

memory/2208-5-0x0000000002020000-0x00000000021D4000-memory.dmp

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»¹Ù·½Õ¾ [www.zuowg.com].url

MD5 7c8c531ff6a158742da186b1fad6e00e
SHA1 98d4551e0d6ac034838a17437640f3335edfaa86
SHA256 00ddbc71282fdbf74b8a02cc75b2c3d66529fe7664c148cc0ca79576a883c501
SHA512 1788173da6e9cf7e5421c02854ca9122d0825927f33fc64bafb76377ee80c0e1a8112c36ee40b1cbce86e121f864777e8ddf9aecd282f3cc82b70e12cc904805

C:\Users\Admin\Favorites\Íâ¹Ò×÷·»×ÊÔ´Õ¾ [42724920.ys168.com].url

MD5 3c12b619f5b9575ba2944b7ca4678929
SHA1 fa6792387198c2d93de2619059efc5206341198d
SHA256 add35880f84004b1422166fe432267249036168ddcf0185481769021980b300a
SHA512 d1e370e03affc9acfa770edc5959bc8009d15d026e4f4cd45314c8e213e371b765828f7a4921169c62c6848dcdbda38311620f4b7af922479b923a6ef12a355d

memory/2208-36-0x0000000000630000-0x0000000000730000-memory.dmp

memory/2208-39-0x0000000010000000-0x0000000010048000-memory.dmp

\Users\Admin\AppData\Local\Temp\039d8f204079b0859dbb01c0ffc2f7f5_JaffaCakes118.exe1026932\iext.fnr

MD5 b8546d0c3a88077599a4c52eca3d5a97
SHA1 1470a09a892f798b75c10c0b165bd3e65ea432f8
SHA256 c0d69587de55c79f0f4ea69e9fa62d35fb595a3fda406ed243035c5639158816
SHA512 70fb099df16f3575604c4114e48ac54a8ec9ebd7b6008b7f5411b3b3a77ed6847c703a1fd0d00b145c3f41d7529e08ebd37791b261f2cd6aaaa51db21d121b07

memory/2208-35-0x0000000000630000-0x0000000000730000-memory.dmp

memory/2208-44-0x0000000010000000-0x0000000010048000-memory.dmp

memory/2208-46-0x0000000002020000-0x00000000021D4000-memory.dmp