General
-
Target
8b6bc16fd137c09a08b02bbe1bb7d670_JaffaCakes118
-
Size
604KB
-
Sample
240601-xht1zscd72
-
MD5
8b6bc16fd137c09a08b02bbe1bb7d670
-
SHA1
c69a0f6c6f809c01db92ca658fcf1b643391a2b7
-
SHA256
e67834d1e8b38ec5864cfa101b140aeaba8f1900a6e269e6a94c90fcbfe56678
-
SHA512
b53d2cc0fe5fa52262ace9f6e6ea3f5ce84935009822a3394bfe49c4d15dfeaa96bfe10ce77ffa93dbf81e5428122aa739a94bc709f203bc346597004fd75a24
-
SSDEEP
6144:yYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsR:yYKlYmDXEpDHRXP01
Static task
static1
Behavioral task
behavioral1
Sample
8b6bc16fd137c09a08b02bbe1bb7d670_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b6bc16fd137c09a08b02bbe1bb7d670_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___SI06_.txt
cerber
http://p27dokhpz2n7nvgr.onion/CF9D-87C2-24BA-0446-9D1F
http://p27dokhpz2n7nvgr.12hygy.top/CF9D-87C2-24BA-0446-9D1F
http://p27dokhpz2n7nvgr.14ewqv.top/CF9D-87C2-24BA-0446-9D1F
http://p27dokhpz2n7nvgr.14vvrc.top/CF9D-87C2-24BA-0446-9D1F
http://p27dokhpz2n7nvgr.129p1t.top/CF9D-87C2-24BA-0446-9D1F
http://p27dokhpz2n7nvgr.1apgrn.top/CF9D-87C2-24BA-0446-9D1F
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___LSAGL_.txt
cerber
http://p27dokhpz2n7nvgr.onion/14DD-8438-14EA-0446-9E62
http://p27dokhpz2n7nvgr.12hygy.top/14DD-8438-14EA-0446-9E62
http://p27dokhpz2n7nvgr.14ewqv.top/14DD-8438-14EA-0446-9E62
http://p27dokhpz2n7nvgr.14vvrc.top/14DD-8438-14EA-0446-9E62
http://p27dokhpz2n7nvgr.129p1t.top/14DD-8438-14EA-0446-9E62
http://p27dokhpz2n7nvgr.1apgrn.top/14DD-8438-14EA-0446-9E62
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___OGH8_.hta
cerber
Targets
-
-
Target
8b6bc16fd137c09a08b02bbe1bb7d670_JaffaCakes118
-
Size
604KB
-
MD5
8b6bc16fd137c09a08b02bbe1bb7d670
-
SHA1
c69a0f6c6f809c01db92ca658fcf1b643391a2b7
-
SHA256
e67834d1e8b38ec5864cfa101b140aeaba8f1900a6e269e6a94c90fcbfe56678
-
SHA512
b53d2cc0fe5fa52262ace9f6e6ea3f5ce84935009822a3394bfe49c4d15dfeaa96bfe10ce77ffa93dbf81e5428122aa739a94bc709f203bc346597004fd75a24
-
SSDEEP
6144:yYghlI5/u8f1mr+4RJ99MpDa52RX5wRDhOOU0qsR:yYKlYmDXEpDHRXP01
Score10/10-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-