General
-
Target
ddf213af2398313fbbab060f48968499_JaffaCakes118
-
Size
504KB
-
Sample
240913-h7n4ps1djl
-
MD5
ddf213af2398313fbbab060f48968499
-
SHA1
6cf48ff4999b6697076fac8aba03a3c2e5b6e7dd
-
SHA256
e11c6b8b5b102a0b3bdb0756496594c0ba37f08d27320a7bde4d7f70fbd63256
-
SHA512
efb5032c1ef5aecc40610537733ef4dde2abc84501907dc7cb7a72c04d248a759ec1b85efebae00c81067382969f5f34d54ebba10cf9ba9ad6f13578842a9aa8
-
SSDEEP
6144:c867hSKXt8UaTxPMhvXoIdUbYgiE9ZrH16Ov1rN2s4JI/yUICVL8VfaDCFToWQs:y7G5xP+L6kZE9VV6O1MUgfaOzQs
Static task
static1
Behavioral task
behavioral1
Sample
ddf213af2398313fbbab060f48968499_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddf213af2398313fbbab060f48968499_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_PIBAQ_.txt
http://p27dokhpz2n7nvgr.onion/6BFD-674E-E418-0091-B81D
http://p27dokhpz2n7nvgr.1a7wnt.top/6BFD-674E-E418-0091-B81D
http://p27dokhpz2n7nvgr.1czh7o.top/6BFD-674E-E418-0091-B81D
http://p27dokhpz2n7nvgr.1hpvzl.top/6BFD-674E-E418-0091-B81D
http://p27dokhpz2n7nvgr.1pglcs.top/6BFD-674E-E418-0091-B81D
http://p27dokhpz2n7nvgr.1cewld.top/6BFD-674E-E418-0091-B81D
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_CVG9FH_.hta
cerber
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_E6KY_.txt
http://p27dokhpz2n7nvgr.onion/86D3-1901-8032-0091-B676
http://p27dokhpz2n7nvgr.1a7wnt.top/86D3-1901-8032-0091-B676
http://p27dokhpz2n7nvgr.1czh7o.top/86D3-1901-8032-0091-B676
http://p27dokhpz2n7nvgr.1hpvzl.top/86D3-1901-8032-0091-B676
http://p27dokhpz2n7nvgr.1pglcs.top/86D3-1901-8032-0091-B676
http://p27dokhpz2n7nvgr.1cewld.top/86D3-1901-8032-0091-B676
Targets
-
-
Target
ddf213af2398313fbbab060f48968499_JaffaCakes118
-
Size
504KB
-
MD5
ddf213af2398313fbbab060f48968499
-
SHA1
6cf48ff4999b6697076fac8aba03a3c2e5b6e7dd
-
SHA256
e11c6b8b5b102a0b3bdb0756496594c0ba37f08d27320a7bde4d7f70fbd63256
-
SHA512
efb5032c1ef5aecc40610537733ef4dde2abc84501907dc7cb7a72c04d248a759ec1b85efebae00c81067382969f5f34d54ebba10cf9ba9ad6f13578842a9aa8
-
SSDEEP
6144:c867hSKXt8UaTxPMhvXoIdUbYgiE9ZrH16Ov1rN2s4JI/yUICVL8VfaDCFToWQs:y7G5xP+L6kZE9VV6O1MUgfaOzQs
-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2