Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe
-
Size
237KB
-
MD5
4f9dbed0c196736850754a608ca45fa9
-
SHA1
8abd87beec30bf4890e3d3833763be1f9de2383b
-
SHA256
f7c3379558086abbfc0d443b445c6f16ba65915027f12027d7e0a2a3385c4a61
-
SHA512
15cb565bb88428cff0f4dbf2b0169af6ad55bb41b9fdd02fc3d7c4741de29167149e07b683419192a1b88b261e0f4ad11d2ae6b7e5fede54befc1634b166ef61
-
SSDEEP
3072:eCz47U4Mhzjqdka/ainvKrF8KAwAbGlRkiURzCwV/Vm1PBkVcTG0DuL0hz10r:eUKMJjqO7ovqaGl8zCwrm1PIcTggpQ
Malware Config
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\README.hta
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (529) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp895F.bmp" 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\README.hta 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1880 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3220 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe Token: SeBackupPrivilege 4596 vssvc.exe Token: SeRestorePrivilege 4596 vssvc.exe Token: SeAuditPrivilege 4596 vssvc.exe Token: 33 2516 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2516 AUDIODG.EXE Token: SeDebugPrivilege 1880 taskkill.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1768 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 94 PID 1800 wrote to memory of 1768 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 94 PID 1768 wrote to memory of 1000 1768 cmd.exe 96 PID 1768 wrote to memory of 1000 1768 cmd.exe 96 PID 1800 wrote to memory of 4432 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 111 PID 1800 wrote to memory of 4432 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 111 PID 1800 wrote to memory of 4432 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 111 PID 1800 wrote to memory of 1928 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 112 PID 1800 wrote to memory of 1928 1800 4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe 112 PID 1928 wrote to memory of 1880 1928 cmd.exe 114 PID 1928 wrote to memory of 1880 1928 cmd.exe 114 PID 1928 wrote to memory of 3220 1928 cmd.exe 116 PID 1928 wrote to memory of 3220 1928 cmd.exe 116 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete3⤵PID:1000
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵PID:4432
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\taskkill.exetaskkill /f /im "4f9dbed0c196736850754a608ca45fa9_JaffaCakes118.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
PID:3220
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x484 0x43c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5ad4a254e3c6b43ebcc46b6dbbfb54141
SHA1e1c2d70ed3749e0935bac0d670e5b2a16aaa2f3a
SHA2566de2dfd6cceb47b68f3e07b4a38b9311399119633174037f3554e8aa75b384ed
SHA5129ecf4ad14598d77aa3d9b24c25d0ef1a95740a7652a54c05d6d45f2f276b31a4c78d20d306107203fb2850b91607af91369606ada39b1e8e608c3788bf33ab73