General
-
Target
94ad2d4166b4930ae0b2708dc4fbdf02_JaffaCakes118
-
Size
254KB
-
Sample
240604-nlb5xaef3w
-
MD5
94ad2d4166b4930ae0b2708dc4fbdf02
-
SHA1
b286ccfb9f0e293502dd86506ed774ea03bce344
-
SHA256
af158da257464fc21bc1c566b78a621d371b725d185e0eaf89cbecda781c3479
-
SHA512
5e89bef2b48bb0404e33b877be1c88b8a80cc1fac03858f200e5cc669dcbfd2846040c6d553b4ec57293cb600dbd16bf0f2c3799cd1406c239f64cdcdcc5f434
-
SSDEEP
6144:WKkm12ZI49J4bBm1pWCkOTyaNTUohr/z+flgRjG9X:WK312C42BaTkeN40jKJ
Static task
static1
Behavioral task
behavioral1
Sample
94ad2d4166b4930ae0b2708dc4fbdf02_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
94ad2d4166b4930ae0b2708dc4fbdf02_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_Z0Q2PP8J_.txt
http://p27dokhpz2n7nvgr.onion/6B5A-6925-2C81-0091-B768
http://p27dokhpz2n7nvgr.1hpvzl.top/6B5A-6925-2C81-0091-B768
http://p27dokhpz2n7nvgr.1pglcs.top/6B5A-6925-2C81-0091-B768
http://p27dokhpz2n7nvgr.1cewld.top/6B5A-6925-2C81-0091-B768
http://p27dokhpz2n7nvgr.1js3tl.top/6B5A-6925-2C81-0091-B768
http://p27dokhpz2n7nvgr.1ajohk.top/6B5A-6925-2C81-0091-B768
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_QNNG_.txt
http://p27dokhpz2n7nvgr.onion/D7E3-09D3-CAC7-0091-B257
http://p27dokhpz2n7nvgr.1hpvzl.top/D7E3-09D3-CAC7-0091-B257
http://p27dokhpz2n7nvgr.1pglcs.top/D7E3-09D3-CAC7-0091-B257
http://p27dokhpz2n7nvgr.1cewld.top/D7E3-09D3-CAC7-0091-B257
http://p27dokhpz2n7nvgr.1js3tl.top/D7E3-09D3-CAC7-0091-B257
http://p27dokhpz2n7nvgr.1ajohk.top/D7E3-09D3-CAC7-0091-B257
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_4Z41_.hta
cerber
Targets
-
-
Target
94ad2d4166b4930ae0b2708dc4fbdf02_JaffaCakes118
-
Size
254KB
-
MD5
94ad2d4166b4930ae0b2708dc4fbdf02
-
SHA1
b286ccfb9f0e293502dd86506ed774ea03bce344
-
SHA256
af158da257464fc21bc1c566b78a621d371b725d185e0eaf89cbecda781c3479
-
SHA512
5e89bef2b48bb0404e33b877be1c88b8a80cc1fac03858f200e5cc669dcbfd2846040c6d553b4ec57293cb600dbd16bf0f2c3799cd1406c239f64cdcdcc5f434
-
SSDEEP
6144:WKkm12ZI49J4bBm1pWCkOTyaNTUohr/z+flgRjG9X:WK312C42BaTkeN40jKJ
Score10/10-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-