General
-
Target
ad03eec5cafdcbfacfcda80ca4204c3f_JaffaCakes118
-
Size
246KB
-
Sample
240615-f8va1atemm
-
MD5
ad03eec5cafdcbfacfcda80ca4204c3f
-
SHA1
7e05dd7d0857ad74045ff84d60d4706b98ba68e0
-
SHA256
28bf229edc097062348ce69a443dbc8be18437e517efa85d827f061c2d5559ed
-
SHA512
1c358eb397fbeaf1a2b95b801ff53585c07a2ac064175aa371f509b398cee9c18fb50a9082ffaa5d6af146d7c9146f62a14a806a6039c225244ef770bac62fe3
-
SSDEEP
3072:WdxNE+Hb+eyz9zIOnj3WCW2EW5x450QdPquvGp857KKGgS15L9RrgwpFYnfcQIO2:WW+7+eMJzSzvGp8SpfOEQIII72m
Static task
static1
Behavioral task
behavioral1
Sample
ad03eec5cafdcbfacfcda80ca4204c3f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ad03eec5cafdcbfacfcda80ca4204c3f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
0nAcR7l8nt.html
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
0nAcR7l8nt.html
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\README.hta
Targets
-
-
Target
ad03eec5cafdcbfacfcda80ca4204c3f_JaffaCakes118
-
Size
246KB
-
MD5
ad03eec5cafdcbfacfcda80ca4204c3f
-
SHA1
7e05dd7d0857ad74045ff84d60d4706b98ba68e0
-
SHA256
28bf229edc097062348ce69a443dbc8be18437e517efa85d827f061c2d5559ed
-
SHA512
1c358eb397fbeaf1a2b95b801ff53585c07a2ac064175aa371f509b398cee9c18fb50a9082ffaa5d6af146d7c9146f62a14a806a6039c225244ef770bac62fe3
-
SSDEEP
3072:WdxNE+Hb+eyz9zIOnj3WCW2EW5x450QdPquvGp857KKGgS15L9RrgwpFYnfcQIO2:WW+7+eMJzSzvGp8SpfOEQIII72m
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (516) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
3e6bf00b3ac976122f982ae2aadb1c51
-
SHA1
caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
-
SHA256
4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
-
SHA512
1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
SSDEEP
192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb
Score3/10 -
-
-
Target
0nAcR7l8nt
-
Size
263B
-
MD5
5a4c8732267e83d232e78e702e29eef0
-
SHA1
a9a86a932d1c870adaff5bb59b021868322fd7b1
-
SHA256
01c83555b9263f52b94e19ee706c33de8d31005467a405c9c2b8510a781cb545
-
SHA512
8a6f5749c89fb230dac790f62fe72bc855d60357d9cf01180d5677ccac962905661e4a4cb12a9db9f25b73af4b6dd38d96606d3dbd5f648d042d3491a1c12354
Score1/10 -