General
-
Target
0cf1a52d9205a6a1a3db34255efae61d_JaffaCakes118
-
Size
309KB
-
Sample
240502-ag999abb9t
-
MD5
0cf1a52d9205a6a1a3db34255efae61d
-
SHA1
5de09f3fc2f2d710da0f78dab3fb59113b2f54f6
-
SHA256
729747338ce60f7438281ca11f62912b470bf79a37774dde8b9c556d954b56b8
-
SHA512
984c721f6c038dbfe8287ae230b00b58a7f1ff67367b57cf84c0987e8be93020c9a132a1cb4f5755144b27494a52d732411e0ccf0efa2bd3cd7a9af230e384e0
-
SSDEEP
6144:spxIWdiWj0ER8J64BgXtruOzyX7dEh1TXlXN39kzaPCe/:snIWdim0ER8J64Bg9ruOeJiNXjtkzj2
Static task
static1
Behavioral task
behavioral1
Sample
0cf1a52d9205a6a1a3db34255efae61d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0cf1a52d9205a6a1a3db34255efae61d_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_SW893_.txt
http://p27dokhpz2n7nvgr.onion/0EC9-1E6F-CA99-0099-3863
http://p27dokhpz2n7nvgr.1pglcs.top/0EC9-1E6F-CA99-0099-3863
http://p27dokhpz2n7nvgr.1cewld.top/0EC9-1E6F-CA99-0099-3863
http://p27dokhpz2n7nvgr.12t3rn.top/0EC9-1E6F-CA99-0099-3863
http://p27dokhpz2n7nvgr.1js3tl.top/0EC9-1E6F-CA99-0099-3863
http://p27dokhpz2n7nvgr.1ajohk.top/0EC9-1E6F-CA99-0099-3863
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_1H89F_.txt
http://p27dokhpz2n7nvgr.onion/EEE2-418D-9FDF-0099-3249
http://p27dokhpz2n7nvgr.1pglcs.top/EEE2-418D-9FDF-0099-3249
http://p27dokhpz2n7nvgr.1cewld.top/EEE2-418D-9FDF-0099-3249
http://p27dokhpz2n7nvgr.12t3rn.top/EEE2-418D-9FDF-0099-3249
http://p27dokhpz2n7nvgr.1js3tl.top/EEE2-418D-9FDF-0099-3249
http://p27dokhpz2n7nvgr.1ajohk.top/EEE2-418D-9FDF-0099-3249
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_BLSPE62_.hta
cerber
Targets
-
-
Target
0cf1a52d9205a6a1a3db34255efae61d_JaffaCakes118
-
Size
309KB
-
MD5
0cf1a52d9205a6a1a3db34255efae61d
-
SHA1
5de09f3fc2f2d710da0f78dab3fb59113b2f54f6
-
SHA256
729747338ce60f7438281ca11f62912b470bf79a37774dde8b9c556d954b56b8
-
SHA512
984c721f6c038dbfe8287ae230b00b58a7f1ff67367b57cf84c0987e8be93020c9a132a1cb4f5755144b27494a52d732411e0ccf0efa2bd3cd7a9af230e384e0
-
SSDEEP
6144:spxIWdiWj0ER8J64BgXtruOzyX7dEh1TXlXN39kzaPCe/:snIWdim0ER8J64Bg9ruOeJiNXjtkzj2
Score10/10-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-