General
-
Target
ad7f9beb5e47fc363ed3d287a1d03516_JaffaCakes118
-
Size
231KB
-
Sample
240820-clq4aaydra
-
MD5
ad7f9beb5e47fc363ed3d287a1d03516
-
SHA1
58eef9604900dc99af1e972de9b1db72fe54032b
-
SHA256
397a0bf45f99385aa09034dd86e728b9b7ef71f5e119653e6d5273133dcd8bcc
-
SHA512
55ca723c4b0ca8a07ced3fdda521159776e7af1bf81cfd82addc4c00f80274588aa4ea91fa9d6267b2370a25d1169c6dfe2a9001a35983fe3e175b30d9aa33d2
-
SSDEEP
6144:FHLh2kOTTNtitrR9YHT54eB+nKYz2j3vKk2Zyzo:F1c7ifu4eB+nKY0/KkBz
Static task
static1
Behavioral task
behavioral1
Sample
ad7f9beb5e47fc363ed3d287a1d03516_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad7f9beb5e47fc363ed3d287a1d03516_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___C6PMC46_.txt
http://xpcx6erilkjced3j.onion/A60F-C395-BF3A-0006-4C70
http://xpcx6erilkjced3j.tor2web.org/A60F-C395-BF3A-0006-4C70
http://xpcx6erilkjced3j.onion.link/A60F-C395-BF3A-0006-4C70
http://xpcx6erilkjced3j.onion.nu/A60F-C395-BF3A-0006-4C70
http://xpcx6erilkjced3j.onion.cab/A60F-C395-BF3A-0006-4C70
http://xpcx6erilkjced3j.onion.to/A60F-C395-BF3A-0006-4C70
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___Q6Y9_.txt
http://xpcx6erilkjced3j.onion/7DAA-93C5-DFA2-0006-45AB
http://xpcx6erilkjced3j.tor2web.org/7DAA-93C5-DFA2-0006-45AB
http://xpcx6erilkjced3j.onion.link/7DAA-93C5-DFA2-0006-45AB
http://xpcx6erilkjced3j.onion.nu/7DAA-93C5-DFA2-0006-45AB
http://xpcx6erilkjced3j.onion.cab/7DAA-93C5-DFA2-0006-45AB
http://xpcx6erilkjced3j.onion.to/7DAA-93C5-DFA2-0006-45AB
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___AODWNJ1B_.hta
cerber
Targets
-
-
Target
ad7f9beb5e47fc363ed3d287a1d03516_JaffaCakes118
-
Size
231KB
-
MD5
ad7f9beb5e47fc363ed3d287a1d03516
-
SHA1
58eef9604900dc99af1e972de9b1db72fe54032b
-
SHA256
397a0bf45f99385aa09034dd86e728b9b7ef71f5e119653e6d5273133dcd8bcc
-
SHA512
55ca723c4b0ca8a07ced3fdda521159776e7af1bf81cfd82addc4c00f80274588aa4ea91fa9d6267b2370a25d1169c6dfe2a9001a35983fe3e175b30d9aa33d2
-
SSDEEP
6144:FHLh2kOTTNtitrR9YHT54eB+nKYz2j3vKk2Zyzo:F1c7ifu4eB+nKY0/KkBz
-
Blocklisted process makes network request
-
Contacts a large (1096) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2