General
-
Target
89b6ac3f554f1f12027da55d326feac6_JaffaCakes118
-
Size
445KB
-
Sample
240601-h3aqhsed73
-
MD5
89b6ac3f554f1f12027da55d326feac6
-
SHA1
6ab29388f16d900c1c97121223c0540c0455a20e
-
SHA256
eaf67c1c47f93dab2d4c7325fb2dbaf85559c03ea778fc67bc64665963322815
-
SHA512
ba4664d1ebb005925fc54ae974ce63991c14d63121e86a829ab9db2eeb6b194e874a2f95af35d4576ca3ff118dd962e65a139765a0170a93b4c0e8af2290f1db
-
SSDEEP
6144:nj4aJgQ6NTzZhu+Ywh3XofITS80ghHa4t1BYNk83ZbTNovPsd8Hs6:j/SFZoMh3X3Td0yFt1h8J5GO8M6
Static task
static1
Behavioral task
behavioral1
Sample
89b6ac3f554f1f12027da55d326feac6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89b6ac3f554f1f12027da55d326feac6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_TB375_.txt
http://p27dokhpz2n7nvgr.onion/20C4-DE43-E1C5-0098-93F3
http://p27dokhpz2n7nvgr.1hpvzl.top/20C4-DE43-E1C5-0098-93F3
http://p27dokhpz2n7nvgr.1pglcs.top/20C4-DE43-E1C5-0098-93F3
http://p27dokhpz2n7nvgr.1cewld.top/20C4-DE43-E1C5-0098-93F3
http://p27dokhpz2n7nvgr.1js3tl.top/20C4-DE43-E1C5-0098-93F3
http://p27dokhpz2n7nvgr.1ajohk.top/20C4-DE43-E1C5-0098-93F3
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_R6Z5Z9Y_.txt
http://p27dokhpz2n7nvgr.onion/31CB-685C-2480-0098-91F5
http://p27dokhpz2n7nvgr.1hpvzl.top/31CB-685C-2480-0098-91F5
http://p27dokhpz2n7nvgr.1pglcs.top/31CB-685C-2480-0098-91F5
http://p27dokhpz2n7nvgr.1cewld.top/31CB-685C-2480-0098-91F5
http://p27dokhpz2n7nvgr.1js3tl.top/31CB-685C-2480-0098-91F5
http://p27dokhpz2n7nvgr.1ajohk.top/31CB-685C-2480-0098-91F5
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_12SSSN_.hta
cerber
Targets
-
-
Target
89b6ac3f554f1f12027da55d326feac6_JaffaCakes118
-
Size
445KB
-
MD5
89b6ac3f554f1f12027da55d326feac6
-
SHA1
6ab29388f16d900c1c97121223c0540c0455a20e
-
SHA256
eaf67c1c47f93dab2d4c7325fb2dbaf85559c03ea778fc67bc64665963322815
-
SHA512
ba4664d1ebb005925fc54ae974ce63991c14d63121e86a829ab9db2eeb6b194e874a2f95af35d4576ca3ff118dd962e65a139765a0170a93b4c0e8af2290f1db
-
SSDEEP
6144:nj4aJgQ6NTzZhu+Ywh3XofITS80ghHa4t1BYNk83ZbTNovPsd8Hs6:j/SFZoMh3X3Td0yFt1h8J5GO8M6
Score10/10-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-