Overview
overview
10Static
static
3ddfb8164db...18.exe
windows7-x64
10ddfb8164db...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3uninstgs.exe
windows7-x64
7uninstgs.exe
windows10-2004-x64
7General
-
Target
ddfb8164db8190fbf83e8c381ff4e5da_JaffaCakes118
-
Size
259KB
-
Sample
240913-jlfe4ssemf
-
MD5
ddfb8164db8190fbf83e8c381ff4e5da
-
SHA1
0e790bb763b4b176907e641dcc5c585725fdf129
-
SHA256
14e07837486bfc36e522a197efdc235751b453d438b9e6d584a344475926b3dc
-
SHA512
2ea6f7c5e5842524ef0cbaf7cf1d3d480cb6542028f65e52383433964113597db5d8ec198114471942ed88f34cf30f6f14bc1f1262c57f95c34f3ae9465f08fb
-
SSDEEP
6144:WW+7+eMYBIdObg167OJKEWMaXD8U7dSzhzqAZj:WRzBOOU167sKJ5j7dSwAZ
Static task
static1
Behavioral task
behavioral1
Sample
ddfb8164db8190fbf83e8c381ff4e5da_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddfb8164db8190fbf83e8c381ff4e5da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
uninstgs.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
uninstgs.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\README.hta
Targets
-
-
Target
ddfb8164db8190fbf83e8c381ff4e5da_JaffaCakes118
-
Size
259KB
-
MD5
ddfb8164db8190fbf83e8c381ff4e5da
-
SHA1
0e790bb763b4b176907e641dcc5c585725fdf129
-
SHA256
14e07837486bfc36e522a197efdc235751b453d438b9e6d584a344475926b3dc
-
SHA512
2ea6f7c5e5842524ef0cbaf7cf1d3d480cb6542028f65e52383433964113597db5d8ec198114471942ed88f34cf30f6f14bc1f1262c57f95c34f3ae9465f08fb
-
SSDEEP
6144:WW+7+eMYBIdObg167OJKEWMaXD8U7dSzhzqAZj:WRzBOOU167sKJ5j7dSwAZ
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (517) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
3e6bf00b3ac976122f982ae2aadb1c51
-
SHA1
caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
-
SHA256
4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
-
SHA512
1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
SSDEEP
192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb
Score3/10 -
-
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
dbdbf4017ff91c9de328697b5fd2e10a
-
SHA1
b597a5e9a8a0b252770933feed51169b5060a09f
-
SHA256
be60a00f32924ccbe03f9914e33b8e1ad8c8a1ca442263a69896efba74925b36
-
SHA512
3befc15aab0a5dbe7fde96155b0499d385f2799b1a2d47ce04f37b5804006b1c6c4fff93d3cedb56a2a8172b23752b6f9dc6168cfce3596b91def3247836cf10
-
SSDEEP
96:33YnIxFkDUGZpKSmktse3GpmD8pevbE9cxSgB5PKtAtYE9v5E9KntrmfVEB3YdkS:33YIvGZDdtP8pevbg0PuAYK56NyoIFI
Score3/10 -
-
-
Target
uninstgs.exe
-
Size
59KB
-
MD5
e60dd784468c06f86095b8c17fb367e9
-
SHA1
7203b28ca452026c7297e512ad1a74a45be95484
-
SHA256
30ab1b9171c3aafcf22d00d2733a17ef3d15bdf7fc0b7193a1430f657ebc5983
-
SHA512
507bb3457b16154796eba62567398b253edaff54b820dd3c99b777ef81744b536b20603c89fe4e67c7ad184cfb1e4f66aeafa7658b93250a151fe7ce1d6b974c
-
SSDEEP
1536:WjoUxZbE+HOI66qkryz9zI+g/EW58gL0AzCWhmf:WdxNE+Hb+eyz9zI+eEW530AFY
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-