General
-
Target
1268348828883dbc98a1a584dec8ded8_JaffaCakes118
-
Size
283KB
-
Sample
240728-lcl8easgja
-
MD5
1268348828883dbc98a1a584dec8ded8
-
SHA1
7fd4ed93d6a549baf7402f7fd5e736faf2ae40f4
-
SHA256
05bbe75c2e13f4e9267f6217a0d91acab003fc7f1eb1a92d81b10bd3cf448f9e
-
SHA512
8d7df58ab9cb6ca13c1e3317cf51ec7ae67e7389e0464794dab8edaabd1b6454d73b8c27796335693f2aa6453a4dfed1261685f10d180a793781ae35adde2dcb
-
SSDEEP
6144:AFM0/rWK/2tG3ZL1hsI5y7XFeLAPlRpQEWpbTMp4Jc3L:AX/d/2QtT5y7XnlRpQHFTMaJGL
Static task
static1
Behavioral task
behavioral1
Sample
1268348828883dbc98a1a584dec8ded8_JaffaCakes118.js
Resource
win7-20240708-en
Malware Config
Extracted
pony
http://dinom.spb.ru/api/index.php
Targets
-
-
Target
1268348828883dbc98a1a584dec8ded8_JaffaCakes118
-
Size
283KB
-
MD5
1268348828883dbc98a1a584dec8ded8
-
SHA1
7fd4ed93d6a549baf7402f7fd5e736faf2ae40f4
-
SHA256
05bbe75c2e13f4e9267f6217a0d91acab003fc7f1eb1a92d81b10bd3cf448f9e
-
SHA512
8d7df58ab9cb6ca13c1e3317cf51ec7ae67e7389e0464794dab8edaabd1b6454d73b8c27796335693f2aa6453a4dfed1261685f10d180a793781ae35adde2dcb
-
SSDEEP
6144:AFM0/rWK/2tG3ZL1hsI5y7XFeLAPlRpQEWpbTMp4Jc3L:AX/d/2QtT5y7XnlRpQHFTMaJGL
-
CrypVault
Ransomware family which makes encrypted files look like they have been quarantined by AV.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1