Malware Analysis Report

2025-03-15 05:52

Sample ID 240628-hmq3kaygqk
Target 192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118
SHA256 a5073b7f48309733fe62d982f874894ed53816f7b71d04895c526649fc4cde76
Tags
vmprotect
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

a5073b7f48309733fe62d982f874894ed53816f7b71d04895c526649fc4cde76

Threat Level: Shows suspicious behavior

The file 192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

vmprotect

VMProtect packed file

Unsigned PE

Suspicious use of SetWindowsHookEx

Modifies Internet Explorer settings

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-28 06:51

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-28 06:51

Reported

2024-06-28 06:54

Platform

win7-20240508-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118.exe"

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 adf.ly udp

Files

memory/492-0-0x0000000000400000-0x0000000000499000-memory.dmp

memory/492-1-0x0000000000401000-0x0000000000405000-memory.dmp

memory/492-4-0x0000000003AE0000-0x0000000004B42000-memory.dmp

memory/492-26-0x0000000000400000-0x0000000000499000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-28 06:51

Reported

2024-06-28 06:54

Platform

win10v2004-20240611-en

Max time kernel

133s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118.exe"

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\192e8aa55e6f9d351592d8f2adc12bef_JaffaCakes118.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2736,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=4192 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 adf.ly udp
US 172.66.40.139:80 adf.ly tcp
US 8.8.8.8:53 publisher.linkvertise.com udp
US 172.67.31.186:443 publisher.linkvertise.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 139.40.66.172.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 186.31.67.172.in-addr.arpa udp
US 8.8.8.8:53 link-hub.net udp
US 104.21.6.192:443 link-hub.net tcp
US 8.8.8.8:53 linkvertise.com udp
US 172.67.31.186:443 linkvertise.com tcp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 67.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 192.6.21.104.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 11.97.55.23.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 cdnjs.cloudflare.com udp
US 8.8.8.8:53 maxst.icons8.com udp
US 8.8.8.8:53 stackpath.bootstrapcdn.com udp
US 104.17.24.14:443 cdnjs.cloudflare.com tcp
GB 195.181.164.19:443 maxst.icons8.com tcp
US 104.18.10.207:443 stackpath.bootstrapcdn.com tcp
US 104.18.10.207:443 stackpath.bootstrapcdn.com tcp
US 8.8.8.8:53 x2.c.lencr.org udp
BE 23.55.97.11:80 x2.c.lencr.org tcp
US 8.8.8.8:53 p.typekit.net udp
SE 184.31.15.57:443 p.typekit.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 14.24.17.104.in-addr.arpa udp
US 8.8.8.8:53 19.164.181.195.in-addr.arpa udp
US 8.8.8.8:53 207.10.18.104.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 js.chargebee.com udp
US 8.8.8.8:53 contextual.media.net udp
US 18.239.208.112:443 js.chargebee.com tcp
BE 104.90.24.23:80 contextual.media.net tcp
US 8.8.8.8:53 c.pki.goog udp
BE 104.90.24.23:443 contextual.media.net tcp
GB 172.217.169.67:80 c.pki.goog tcp
US 8.8.8.8:53 o.pki.goog udp
GB 172.217.169.67:80 o.pki.goog tcp
GB 172.217.169.67:80 o.pki.goog tcp
US 8.8.8.8:53 104.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 66.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 112.208.239.18.in-addr.arpa udp
US 8.8.8.8:53 23.24.90.104.in-addr.arpa udp
US 8.8.8.8:53 211.190.239.18.in-addr.arpa udp
US 8.8.8.8:53 62.215.239.18.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

memory/3588-1-0x0000000000401000-0x0000000000405000-memory.dmp

memory/3588-0-0x0000000000400000-0x0000000000499000-memory.dmp

memory/3588-58-0x0000000000400000-0x0000000000499000-memory.dmp