General
-
Target
ad795aebd3065a1b1afd33df18590758_JaffaCakes118
-
Size
241KB
-
Sample
240615-kbj6zstfje
-
MD5
ad795aebd3065a1b1afd33df18590758
-
SHA1
de6fde3aafbb8da8bf6de2ccf4c3507e71b2cd8f
-
SHA256
56a479280a54fad7a582c3ff8623c885210cf49432a29592c91f2bd95bf6ac3d
-
SHA512
a6c12d0572cc548b7dfd1e792887ecbac8c98d88e5717ae9364eaa43b751ab49f4c8f9480536fc6c87dca9802a119d56240aa0d68276f16666e20d2aec4923a5
-
SSDEEP
6144:Kn/L+GOmXqA8VtR4ZhSTpkdpNRauPmuRfV/A/ETrSQ1tj:0zOmXqActRYhgk5Ra6mkflTrSq
Static task
static1
Behavioral task
behavioral1
Sample
ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
NsResize.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
NsResize.dll
Resource
win10v2004-20240611-en
Malware Config
Extracted
C:\Users\Admin\Documents\README.hta
Extracted
C:\Users\Admin\Music\README.hta
Targets
-
-
Target
ad795aebd3065a1b1afd33df18590758_JaffaCakes118
-
Size
241KB
-
MD5
ad795aebd3065a1b1afd33df18590758
-
SHA1
de6fde3aafbb8da8bf6de2ccf4c3507e71b2cd8f
-
SHA256
56a479280a54fad7a582c3ff8623c885210cf49432a29592c91f2bd95bf6ac3d
-
SHA512
a6c12d0572cc548b7dfd1e792887ecbac8c98d88e5717ae9364eaa43b751ab49f4c8f9480536fc6c87dca9802a119d56240aa0d68276f16666e20d2aec4923a5
-
SSDEEP
6144:Kn/L+GOmXqA8VtR4ZhSTpkdpNRauPmuRfV/A/ETrSQ1tj:0zOmXqActRYhgk5Ra6mkflTrSq
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (513) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a436db0c473a087eb61ff5c53c34ba27
-
SHA1
65ea67e424e75f5065132b539c8b2eda88aa0506
-
SHA256
75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
-
SHA512
908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
SSDEEP
192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e
Score3/10 -
-
-
Target
NsResize.dll
-
Size
28KB
-
MD5
d53bd2d5591a78ea15b3bd59e2652bd6
-
SHA1
40968bcae13ee63469d241200679b25dfa5fdd4c
-
SHA256
1734bceb77dab6739b80575fd7ee87c437327d8eb147339e1d93b7d3235c5394
-
SHA512
c07bbab95251f16ac4b1c03e0324792b35badd111cced2e5c8e0de467226e572edfe5ca6e528c3494664f2569774f6a422806f54883cc2ef3726e21f4a011f5b
-
SSDEEP
192:CQRZmWPG1Cg3ROenIw77QXyDWscAIJJgjZZZZIIqIqIAY:CQRZmH1C0tIw7QyW8sWZZZZ
Score3/10 -