General
-
Target
c14e1e0b99d986a11e3873a97fe6b496_JaffaCakes118
-
Size
245KB
-
Sample
240825-wzmgssyhql
-
MD5
c14e1e0b99d986a11e3873a97fe6b496
-
SHA1
81a1816bca2ecd5386ad470a572e0f2f0d552540
-
SHA256
2f24af7d912806552a0160fcc1d02199a4e2926865791455aa3ab8ea71551e09
-
SHA512
a311ddd3a8b0e4cdd4dc23e46a0488ffdec69cc7bb401aa9af2d0f3ff9c7da3de6c60d32710e50cabf9fecc6b8dd126bf79d79607234f4f2eafb601176f2b9f9
-
SSDEEP
6144:Yn/L+VEJ48dDlHj0WVtm8RJYv+tDCQwPxY07J3dC:uaEjpdj0Wvm8LTDv+A
Static task
static1
Behavioral task
behavioral1
Sample
c14e1e0b99d986a11e3873a97fe6b496_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c14e1e0b99d986a11e3873a97fe6b496_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Perl.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Perl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
fontsize.js
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
fontsize.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\README.hta
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\README.hta
Targets
-
-
Target
c14e1e0b99d986a11e3873a97fe6b496_JaffaCakes118
-
Size
245KB
-
MD5
c14e1e0b99d986a11e3873a97fe6b496
-
SHA1
81a1816bca2ecd5386ad470a572e0f2f0d552540
-
SHA256
2f24af7d912806552a0160fcc1d02199a4e2926865791455aa3ab8ea71551e09
-
SHA512
a311ddd3a8b0e4cdd4dc23e46a0488ffdec69cc7bb401aa9af2d0f3ff9c7da3de6c60d32710e50cabf9fecc6b8dd126bf79d79607234f4f2eafb601176f2b9f9
-
SSDEEP
6144:Yn/L+VEJ48dDlHj0WVtm8RJYv+tDCQwPxY07J3dC:uaEjpdj0Wvm8LTDv+A
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (518) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a436db0c473a087eb61ff5c53c34ba27
-
SHA1
65ea67e424e75f5065132b539c8b2eda88aa0506
-
SHA256
75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
-
SHA512
908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
SSDEEP
192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e
Score3/10 -
-
-
Target
Perl.dll
-
Size
11KB
-
MD5
de3cfe19cebc2322bd5447a8ca9abc47
-
SHA1
8985671f81715c3c1d630cebc1fc48954c16feb8
-
SHA256
dcad4e428c0f7f0fd73500bf346e70fca4ebd28a8874ebd06972681ffce7beb8
-
SHA512
f1ac2a7e9fffe4a14173e398c837ace42207c41a7f0496c0581f040966ba40de5008ed70bdd76f30a5798bd36012a0fee0802389f8ab8907b6937140068a1fda
-
SSDEEP
96:Ob7Q0NFW/YjTVGQjdJY2j/INd+7NjdCuJHbLxS5dNq/E2f3XujkN0k9JP4Pn8PO2:a8mnxkNd+ppCKHb9S5dQM+ujmP4P89
Score3/10 -
-
-
Target
fontsize.js
-
Size
3KB
-
MD5
ce6eb141e7945e01100e19234f0c332b
-
SHA1
281e21b35d1cb9c9848dc8d87bc8405cf2fc0205
-
SHA256
15daedf21d890eb2f48697504c8de40bdf7787944862f1268992d7e92de8c12e
-
SHA512
64f14d25202a29e286f68f5fcfc37d65f598defd698b914134204e8f702e425a24b8045b846fecb2743126257d37b3387926c3fa737811656eeb7a24fe2235ef
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Windows Management Instrumentation
1