Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
CabDLL.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
CabDLL.dll
Resource
win10v2004-20240426-en
General
-
Target
2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe
-
Size
238KB
-
MD5
2d38d15d58e0b48403b2b407d8d60520
-
SHA1
7a608aa2e08932ea2c3593961b6485b3d34d452d
-
SHA256
8c683635aa513fd4a30545446fd4bf4439f42d54c7c733ab9a533522f6d084a6
-
SHA512
5aacf2f1b70f9ce3e91a9908da961183dd87e4e450a4479b5833ecd6afd0927cf41fe91d946075954c4c1abe14d8c2503439353aed0c7ff27546135bc6a5b84c
-
SSDEEP
3072:KNdm6/Xbi5XJC/O45Riu9ShhIuiGKSLtNO9axj/LT5yFP26Mt3fZNXTWy813p:Kn/L+GOmF8hFKSZ/1yFujJPW3p
Malware Config
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\README.hta
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (527) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpBF25.bmp" 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1196 set thread context of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\README.hta 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\towpath 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2544 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 440 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2820 WMIC.exe Token: SeSecurityPrivilege 2820 WMIC.exe Token: SeTakeOwnershipPrivilege 2820 WMIC.exe Token: SeLoadDriverPrivilege 2820 WMIC.exe Token: SeSystemProfilePrivilege 2820 WMIC.exe Token: SeSystemtimePrivilege 2820 WMIC.exe Token: SeProfSingleProcessPrivilege 2820 WMIC.exe Token: SeIncBasePriorityPrivilege 2820 WMIC.exe Token: SeCreatePagefilePrivilege 2820 WMIC.exe Token: SeBackupPrivilege 2820 WMIC.exe Token: SeRestorePrivilege 2820 WMIC.exe Token: SeShutdownPrivilege 2820 WMIC.exe Token: SeDebugPrivilege 2820 WMIC.exe Token: SeSystemEnvironmentPrivilege 2820 WMIC.exe Token: SeRemoteShutdownPrivilege 2820 WMIC.exe Token: SeUndockPrivilege 2820 WMIC.exe Token: SeManageVolumePrivilege 2820 WMIC.exe Token: 33 2820 WMIC.exe Token: 34 2820 WMIC.exe Token: 35 2820 WMIC.exe Token: 36 2820 WMIC.exe Token: SeIncreaseQuotaPrivilege 2820 WMIC.exe Token: SeSecurityPrivilege 2820 WMIC.exe Token: SeTakeOwnershipPrivilege 2820 WMIC.exe Token: SeLoadDriverPrivilege 2820 WMIC.exe Token: SeSystemProfilePrivilege 2820 WMIC.exe Token: SeSystemtimePrivilege 2820 WMIC.exe Token: SeProfSingleProcessPrivilege 2820 WMIC.exe Token: SeIncBasePriorityPrivilege 2820 WMIC.exe Token: SeCreatePagefilePrivilege 2820 WMIC.exe Token: SeBackupPrivilege 2820 WMIC.exe Token: SeRestorePrivilege 2820 WMIC.exe Token: SeShutdownPrivilege 2820 WMIC.exe Token: SeDebugPrivilege 2820 WMIC.exe Token: SeSystemEnvironmentPrivilege 2820 WMIC.exe Token: SeRemoteShutdownPrivilege 2820 WMIC.exe Token: SeUndockPrivilege 2820 WMIC.exe Token: SeManageVolumePrivilege 2820 WMIC.exe Token: 33 2820 WMIC.exe Token: 34 2820 WMIC.exe Token: 35 2820 WMIC.exe Token: 36 2820 WMIC.exe Token: SeBackupPrivilege 2320 vssvc.exe Token: SeRestorePrivilege 2320 vssvc.exe Token: SeAuditPrivilege 2320 vssvc.exe Token: 33 4932 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4932 AUDIODG.EXE Token: SeDebugPrivilege 2544 taskkill.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 1196 wrote to memory of 2536 1196 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 90 PID 2536 wrote to memory of 3572 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 96 PID 2536 wrote to memory of 3572 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 96 PID 3572 wrote to memory of 2820 3572 cmd.exe 98 PID 3572 wrote to memory of 2820 3572 cmd.exe 98 PID 2536 wrote to memory of 2488 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 112 PID 2536 wrote to memory of 2488 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 112 PID 2536 wrote to memory of 2488 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 112 PID 2536 wrote to memory of 316 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 113 PID 2536 wrote to memory of 316 2536 2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe 113 PID 316 wrote to memory of 2544 316 cmd.exe 115 PID 316 wrote to memory of 2544 316 cmd.exe 115 PID 316 wrote to memory of 440 316 cmd.exe 117 PID 316 wrote to memory of 440 316 cmd.exe 117 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:2488
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\taskkill.exetaskkill /f /im "2d38d15d58e0b48403b2b407d8d60520_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:440
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
28KB
MD5a4c07c7c2328612f32465ed4350fc6b1
SHA1578e751f602ed19336406e85e59fdc807e8e5e47
SHA2561fb5fd45067a68ca5cd7428ff2ac81cb5b090ee48383e3ab771d89d08eb10332
SHA51224990ceb668f03410ee62fcf47cfae57a0c5cd1dc09308f8b839c9bcb3ae20c332fdd9ab4a1e63996035b2c835a2aba07b1a38d5a94a47f4432d2c781d711283
-
Filesize
61KB
MD5d6149e6b4e9bceba90808404c3f49ed8
SHA12a74da5777d2e165c1e3d03036b161c62431c789
SHA256b07a42d731747f286577398bfa01f6402878abdfce692b32e0624e1c8fa518b4
SHA51205e7e992ccf4bb94f6bfe7b794c78916c70df0543a2c5ddc70eb1a82ab29b636d6d11acc5d910e67c3941c514b710d4a52856f5ebcd865c33de95247a3345765