Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
NsResize.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
NsResize.dll
Resource
win10v2004-20240611-en
General
-
Target
ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe
-
Size
241KB
-
MD5
ad795aebd3065a1b1afd33df18590758
-
SHA1
de6fde3aafbb8da8bf6de2ccf4c3507e71b2cd8f
-
SHA256
56a479280a54fad7a582c3ff8623c885210cf49432a29592c91f2bd95bf6ac3d
-
SHA512
a6c12d0572cc548b7dfd1e792887ecbac8c98d88e5717ae9364eaa43b751ab49f4c8f9480536fc6c87dca9802a119d56240aa0d68276f16666e20d2aec4923a5
-
SSDEEP
6144:Kn/L+GOmXqA8VtR4ZhSTpkdpNRauPmuRfV/A/ETrSQ1tj:0zOmXqActRYhgk5Ra6mkflTrSq
Malware Config
Extracted
C:\Users\Admin\Music\README.hta
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (514) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE7D.bmp" ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\README.hta ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2700 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1712 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2784 WMIC.exe Token: SeSecurityPrivilege 2784 WMIC.exe Token: SeTakeOwnershipPrivilege 2784 WMIC.exe Token: SeLoadDriverPrivilege 2784 WMIC.exe Token: SeSystemProfilePrivilege 2784 WMIC.exe Token: SeSystemtimePrivilege 2784 WMIC.exe Token: SeProfSingleProcessPrivilege 2784 WMIC.exe Token: SeIncBasePriorityPrivilege 2784 WMIC.exe Token: SeCreatePagefilePrivilege 2784 WMIC.exe Token: SeBackupPrivilege 2784 WMIC.exe Token: SeRestorePrivilege 2784 WMIC.exe Token: SeShutdownPrivilege 2784 WMIC.exe Token: SeDebugPrivilege 2784 WMIC.exe Token: SeSystemEnvironmentPrivilege 2784 WMIC.exe Token: SeRemoteShutdownPrivilege 2784 WMIC.exe Token: SeUndockPrivilege 2784 WMIC.exe Token: SeManageVolumePrivilege 2784 WMIC.exe Token: 33 2784 WMIC.exe Token: 34 2784 WMIC.exe Token: 35 2784 WMIC.exe Token: 36 2784 WMIC.exe Token: SeIncreaseQuotaPrivilege 2784 WMIC.exe Token: SeSecurityPrivilege 2784 WMIC.exe Token: SeTakeOwnershipPrivilege 2784 WMIC.exe Token: SeLoadDriverPrivilege 2784 WMIC.exe Token: SeSystemProfilePrivilege 2784 WMIC.exe Token: SeSystemtimePrivilege 2784 WMIC.exe Token: SeProfSingleProcessPrivilege 2784 WMIC.exe Token: SeIncBasePriorityPrivilege 2784 WMIC.exe Token: SeCreatePagefilePrivilege 2784 WMIC.exe Token: SeBackupPrivilege 2784 WMIC.exe Token: SeRestorePrivilege 2784 WMIC.exe Token: SeShutdownPrivilege 2784 WMIC.exe Token: SeDebugPrivilege 2784 WMIC.exe Token: SeSystemEnvironmentPrivilege 2784 WMIC.exe Token: SeRemoteShutdownPrivilege 2784 WMIC.exe Token: SeUndockPrivilege 2784 WMIC.exe Token: SeManageVolumePrivilege 2784 WMIC.exe Token: 33 2784 WMIC.exe Token: 34 2784 WMIC.exe Token: 35 2784 WMIC.exe Token: 36 2784 WMIC.exe Token: SeBackupPrivilege 3368 vssvc.exe Token: SeRestorePrivilege 3368 vssvc.exe Token: SeAuditPrivilege 3368 vssvc.exe Token: 33 4808 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4808 AUDIODG.EXE Token: SeDebugPrivilege 2700 taskkill.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 2512 wrote to memory of 4068 2512 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 87 PID 4068 wrote to memory of 5012 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 93 PID 4068 wrote to memory of 5012 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 93 PID 5012 wrote to memory of 2784 5012 cmd.exe 95 PID 5012 wrote to memory of 2784 5012 cmd.exe 95 PID 4068 wrote to memory of 3172 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 102 PID 4068 wrote to memory of 3172 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 102 PID 4068 wrote to memory of 3172 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 102 PID 4068 wrote to memory of 3444 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 103 PID 4068 wrote to memory of 3444 4068 ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe 103 PID 3444 wrote to memory of 2700 3444 cmd.exe 105 PID 3444 wrote to memory of 2700 3444 cmd.exe 105 PID 3444 wrote to memory of 1712 3444 cmd.exe 107 PID 3444 wrote to memory of 1712 3444 cmd.exe 107 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵PID:3172
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\taskkill.exetaskkill /f /im "ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
PID:1712
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x244 0x4c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
189KB
MD579382b8ded97b3c296d13ec3174627c4
SHA10941ac3bcf63768986fc247587edf7b93ff14137
SHA25698d3bbb508f1e7dc27acc7820f91b6dfb4602bedaa76da8bca49ad33150524db
SHA51276eee44a156dc7183febf03978df9f378a2cbb873f5f70c9ed034dd78d07bae0ada72f022c1d07e9b828a9d14eeff7be994ecb77380ae91180ced57621a6eb5a
-
Filesize
28KB
MD5d53bd2d5591a78ea15b3bd59e2652bd6
SHA140968bcae13ee63469d241200679b25dfa5fdd4c
SHA2561734bceb77dab6739b80575fd7ee87c437327d8eb147339e1d93b7d3235c5394
SHA512c07bbab95251f16ac4b1c03e0324792b35badd111cced2e5c8e0de467226e572edfe5ca6e528c3494664f2569774f6a422806f54883cc2ef3726e21f4a011f5b
-
Filesize
1KB
MD5adb1a285a2b926f98c062fbb74e1e992
SHA11f9799a61072673042a1a3da0fdf3fa93cf10f90
SHA2564ba4637bffa741ba5619c3de97b6c209b5a9deb330385efc7a588492a98b7b45
SHA512aa65628e34601645dfcdcb1f5f0347ae84555bd1a99432d4c25a50044dae932385bfa1f50551f6577d184de684f9264743facb53f4aa2e46bdfeff5c85bc6bd7
-
Filesize
3KB
MD55ac10d2237428e6063a8cfca15c64b13
SHA10fb219fde75cc69b38043c7ba1b2d33124937686
SHA256b8859d030b33f9a62bebbbacf8c4afaff4b5dd1f1635896140cea33c197808e0
SHA512c881a00b7a46f4e0a7c744c05cd1ed569811e219b31917d0dc185be62d8b0488c961b7da59de655a3973ed1515f4199131a724dbba4715123a8a1dffd3195f4b
-
Filesize
61KB
MD53aae1eee83ab45180180bd36a0669d75
SHA1f0d0b493e985a515ccdcb1ec32614709dcc444b6
SHA256927107918815085a7eb519d1b6e3cc7949cabbdb5f627cc12b267e5cdf2289a9
SHA512f9be0ff1fd76818cd500dfe4278b8ed30f2712015719b73bd6e8ffae5316f556363b0adfb680cb3d1d694d6c6079b5c8b1d7b1b92e3338e9acfa70b95e1f3d2d