Malware Analysis Report

2024-11-30 19:24

Sample ID 240924-t81pnstdmq
Target f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118
SHA256 8d8ca0be24de91b4defc6a16a9fdf5d8e964c8b3c7caf863a42a8223b9ac7854
Tags
discovery agilenet
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

8d8ca0be24de91b4defc6a16a9fdf5d8e964c8b3c7caf863a42a8223b9ac7854

Threat Level: Shows suspicious behavior

The file f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery agilenet

Obfuscated with Agile.Net obfuscator

Loads dropped DLL

Unsigned PE

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-24 16:44

Signatures

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-24 16:44

Reported

2024-09-24 16:46

Platform

win7-20240903-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe"

Network

N/A

Files

memory/3052-0-0x00000000746C1000-0x00000000746C2000-memory.dmp

memory/3052-3-0x00000000746C0000-0x0000000074C6B000-memory.dmp

\Users\Admin\AppData\Local\Temp\8124c389-1263-4806-a31e-ed82dc3cfa2c\CliSecureRT.dll

MD5 29ef39c5df23cfa5864e4ba9d8f72eec
SHA1 62eceae41e36b6b89d098f343c37b673619fab6b
SHA256 34cabd36c876660e7f5492c84557a9b25edd0f40f0c2aed73f79078f9a7aa674
SHA512 d9e8c3b084ba67b47bb2d39cdddcd83ec4745e9d8386de93f8b28f15ce80c91c18d9d11e2a58059ac37476bed4b221cc1efa48f01c3e6ac1f8333ffb8b4e9fe8

memory/3052-8-0x0000000074540000-0x000000007459B000-memory.dmp

memory/3052-10-0x0000000010000000-0x0000000010030000-memory.dmp

memory/3052-9-0x00000000746C0000-0x0000000074C6B000-memory.dmp

memory/3052-11-0x00000000746C0000-0x0000000074C6B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-24 16:44

Reported

2024-09-24 16:46

Platform

win10v2004-20240802-en

Max time kernel

96s

Max time network

98s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\f41542b2a85d4f996ca4804bb976eeb2_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp

Files

memory/1784-0-0x00000000752C2000-0x00000000752C3000-memory.dmp

memory/1784-1-0x00000000752C0000-0x0000000075871000-memory.dmp

memory/1784-2-0x00000000752C0000-0x0000000075871000-memory.dmp

memory/1784-10-0x0000000073FE0000-0x000000007403B000-memory.dmp

memory/1784-11-0x0000000010000000-0x0000000010030000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8124c389-1263-4806-a31e-ed82dc3cfa2c\CliSecureRT.dll

MD5 29ef39c5df23cfa5864e4ba9d8f72eec
SHA1 62eceae41e36b6b89d098f343c37b673619fab6b
SHA256 34cabd36c876660e7f5492c84557a9b25edd0f40f0c2aed73f79078f9a7aa674
SHA512 d9e8c3b084ba67b47bb2d39cdddcd83ec4745e9d8386de93f8b28f15ce80c91c18d9d11e2a58059ac37476bed4b221cc1efa48f01c3e6ac1f8333ffb8b4e9fe8

memory/1784-13-0x00000000752C0000-0x0000000075871000-memory.dmp

memory/1784-14-0x0000000010000000-0x0000000010030000-memory.dmp