Malware Analysis Report

2025-01-22 12:58

Sample ID 240626-hcaylazhka
Target 110c3b92a77779be27abcd0ac02c3225_JaffaCakes118
SHA256 7b45224ffa98dee12de481881d46aa8026cc72fbb6b8e927a69dbe6fbc18ebb7
Tags
vmprotect upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

7b45224ffa98dee12de481881d46aa8026cc72fbb6b8e927a69dbe6fbc18ebb7

Threat Level: Shows suspicious behavior

The file 110c3b92a77779be27abcd0ac02c3225_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

vmprotect upx

ACProtect 1.3x - 1.4x DLL software

VMProtect packed file

Loads dropped DLL

UPX packed file

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Enumerates physical storage devices

Modifies Internet Explorer settings

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-26 06:35

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-26 06:35

Reported

2024-06-26 06:37

Platform

win7-20240611-en

Max time kernel

148s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.csfz.info udp
US 8.8.8.8:53 www.baidu.com udp
US 8.8.8.8:53 ds.kejifa.com udp

Files

memory/2352-0-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-1-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-15-0x0000000000424000-0x0000000000425000-memory.dmp

\Users\Admin\AppData\Local\Temp\SkinH_EL.dll

MD5 8e1ebf661ba3518d4afdf0516308a3ea
SHA1 e56f4de1402d4bdedb492c751cc363eb6e55c360
SHA256 d748b34b19f86aee6f94824eb3a0a1aa7fc0b003e7ad759d224f7b5a2fb870f2
SHA512 96d6744c2f6e5aaa96aa93347a2183092daf4971f74f2e19f29c5277d0d89593df0333ababd89fb32a934488fdb996dddd448a5e3e2270b1a66b793b38c897ec

memory/2352-16-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-27-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-28-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-29-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-30-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-31-0x0000000010000000-0x000000001003C000-memory.dmp

memory/2352-41-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-53-0x0000000000400000-0x000000000074D000-memory.dmp

memory/2352-55-0x0000000000400000-0x000000000074D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-26 06:35

Reported

2024-06-26 06:37

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\110c3b92a77779be27abcd0ac02c3225_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 www.csfz.info udp
US 8.8.8.8:53 www.baidu.com udp
US 8.8.8.8:53 80.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 65.139.73.23.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 18.173.189.20.in-addr.arpa udp

Files

memory/5060-0-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-1-0x000000000062B000-0x000000000062C000-memory.dmp

memory/5060-2-0x0000000000400000-0x000000000074D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\e57694f.tmp

MD5 4f3387277ccbd6d1f21ac5c07fe4ca68
SHA1 e16506f662dc92023bf82def1d621497c8ab5890
SHA256 767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA512 9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

C:\Users\Admin\AppData\Local\Temp\e576950.tmp

MD5 5870ea0d6ba8dd6e2008466bdd00e0f4
SHA1 d41bf60d0dedff90e3cfc1b41b7e1a73df39a7d5
SHA256 5a7dac8c8b5d7cf1115246dfaf994e7f50e16a7eac1488642396f5e23fddfe0d
SHA512 0c620d5e7383adcf979feccc3b1bad584a5cec8b3d74d0ace8bb786f1f04ba87fa70d59d041dc3833977d44a75f2070181d4054c7c0b9c4ce2d66249b4b3c837

C:\Users\Admin\AppData\Local\Temp\e576951.tmp

MD5 f6b847a54cfb804a25b8842b45fd1d50
SHA1 bb22fef07ce1577c8a7fa057d8cf05502c013bfc
SHA256 5dd2f5a957946e0b6f63660ebd897851aad4795d4c847396c47ddbb647715583
SHA512 dd08a55f538e2a33e6a0c496dc97ae9045594cbbf62f7894ae8ded63f4dc0b2e89c5935269adfd1c19607b1d2474bddc49f6acb955e6dc53a55560663ca2137a

C:\Users\Admin\AppData\Local\Temp\SkinH_EL.dll

MD5 8e1ebf661ba3518d4afdf0516308a3ea
SHA1 e56f4de1402d4bdedb492c751cc363eb6e55c360
SHA256 d748b34b19f86aee6f94824eb3a0a1aa7fc0b003e7ad759d224f7b5a2fb870f2
SHA512 96d6744c2f6e5aaa96aa93347a2183092daf4971f74f2e19f29c5277d0d89593df0333ababd89fb32a934488fdb996dddd448a5e3e2270b1a66b793b38c897ec

memory/5060-55-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-53-0x0000000010000000-0x000000001003C000-memory.dmp

memory/5060-56-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-66-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-67-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-68-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-69-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-70-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-71-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-81-0x0000000010000000-0x000000001003C000-memory.dmp

memory/5060-85-0x0000000000400000-0x000000000074D000-memory.dmp

memory/5060-87-0x0000000000400000-0x000000000074D000-memory.dmp