General
-
Target
c7e7e1b381bdf875b4bd69c5ec3f0b85_JaffaCakes118
-
Size
398KB
-
Sample
240829-akchdswbmm
-
MD5
c7e7e1b381bdf875b4bd69c5ec3f0b85
-
SHA1
da2c23929c55648e0e546deb35fd0023f86fc271
-
SHA256
055c93a41529b2d7cee924fb9b4c490dc11d38e6746c8c43700433f4df816534
-
SHA512
b9fd14500186bd158309e59822e4421077b4f0db8ce2952a7147721caba94cd5f58c37943e9cad20233f1ef795b9042b67a392f9c3fe3d08d9c3f9a0f479803d
-
SSDEEP
12288:2ZbsgueyxpRPsQEfUz3fj1Urd+2tsYqVWzVz3j8LDR:GblueouUz3L1Uw2tn7zT8LF
Behavioral task
behavioral1
Sample
c7e7e1b381bdf875b4bd69c5ec3f0b85_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7e7e1b381bdf875b4bd69c5ec3f0b85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_JNONR_.txt
http://p27dokhpz2n7nvgr.onion/48D0-9273-FCBB-0446-95E7
http://p27dokhpz2n7nvgr.1a7wnt.top/48D0-9273-FCBB-0446-95E7
http://p27dokhpz2n7nvgr.1czh7o.top/48D0-9273-FCBB-0446-95E7
http://p27dokhpz2n7nvgr.1hpvzl.top/48D0-9273-FCBB-0446-95E7
http://p27dokhpz2n7nvgr.1pglcs.top/48D0-9273-FCBB-0446-95E7
http://p27dokhpz2n7nvgr.1cewld.top/48D0-9273-FCBB-0446-95E7
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_BP32AOWW_.txt
http://p27dokhpz2n7nvgr.onion/2DE0-C462-F97B-0446-9111
http://p27dokhpz2n7nvgr.1a7wnt.top/2DE0-C462-F97B-0446-9111
http://p27dokhpz2n7nvgr.1czh7o.top/2DE0-C462-F97B-0446-9111
http://p27dokhpz2n7nvgr.1hpvzl.top/2DE0-C462-F97B-0446-9111
http://p27dokhpz2n7nvgr.1pglcs.top/2DE0-C462-F97B-0446-9111
http://p27dokhpz2n7nvgr.1cewld.top/2DE0-C462-F97B-0446-9111
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_KSU5_.hta
cerber
Targets
-
-
Target
c7e7e1b381bdf875b4bd69c5ec3f0b85_JaffaCakes118
-
Size
398KB
-
MD5
c7e7e1b381bdf875b4bd69c5ec3f0b85
-
SHA1
da2c23929c55648e0e546deb35fd0023f86fc271
-
SHA256
055c93a41529b2d7cee924fb9b4c490dc11d38e6746c8c43700433f4df816534
-
SHA512
b9fd14500186bd158309e59822e4421077b4f0db8ce2952a7147721caba94cd5f58c37943e9cad20233f1ef795b9042b67a392f9c3fe3d08d9c3f9a0f479803d
-
SSDEEP
12288:2ZbsgueyxpRPsQEfUz3fj1Urd+2tsYqVWzVz3j8LDR:GblueouUz3L1Uw2tn7zT8LF
-
Blocklisted process makes network request
-
Contacts a large (1096) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2