Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
hallmark.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
hallmark.dll
Resource
win10v2004-20240802-en
General
-
Target
df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe
-
Size
286KB
-
MD5
df42ed840c87e706e4a52d8911973ecf
-
SHA1
19bb2819272583cbbb82827c811c73770345d00c
-
SHA256
b9036a948454a30175b1e9ca353271f1b6f54b699498e697e3ac4de0d5ceb438
-
SHA512
357dc423bbb1723d4c15aa4e727512ddf8de9a119f6779bbc958ecbcab7c54a7c68e903ea52ae9cf5bb64d675bedf567c3534866d814927dac774eca0d260dcd
-
SSDEEP
6144:c+bxZavkm3psZx4eq7ceBU86Ehgw2Uol3rn72pRnHwkCgUTz:c+6vkm5sZqeqRBUXEhg1d3rnMhHbCgU3
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_README_I4LBMO_.hta
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Contacts a large (587) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Loads dropped DLL 3 IoCs
pid Process 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpFADB.bmp" df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 224 set thread context of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 -
Drops file in Program Files directory 20 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\microsoft\microsoft sql server df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\office df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\outlook df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\powerpoint df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\steam df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\word df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\bitcoin df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\office df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\onenote df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\thunderbird df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\ df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\excel df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\excel df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\onenote df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\powerpoint df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\the bat! df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files\ df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\word df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\ df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2196 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 2056 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2196 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe Token: 33 2444 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2444 AUDIODG.EXE Token: SeDebugPrivilege 2056 taskkill.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 224 wrote to memory of 5076 224 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 90 PID 5076 wrote to memory of 1124 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 96 PID 5076 wrote to memory of 1124 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 96 PID 5076 wrote to memory of 1124 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 96 PID 5076 wrote to memory of 2660 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 99 PID 5076 wrote to memory of 2660 5076 df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe 99 PID 2660 wrote to memory of 2056 2660 cmd.exe 101 PID 2660 wrote to memory of 2056 2660 cmd.exe 101 PID 2660 wrote to memory of 2196 2660 cmd.exe 102 PID 2660 wrote to memory of 2196 2660 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops startup file
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_README_NWK5C_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:1124
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\taskkill.exetaskkill /f /im "df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2196
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x450 0x3d81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5f8548f3f77c833686570585e9631b17d
SHA1f4e3e57d939fe4aae7e9d7cc62eb59093456471d
SHA2562ca4249858bf83d059b929e38a025438f8401ac49c15d8c1ca043a8b39011348
SHA51232e7f995daca981c956464805f7b5d6fd0133d30efddd796491f46fdc2db702cf6cab5ad0bd8c944916eac59311dc2c55b91836374aa9e73b992c51fbda4b2a9
-
Filesize
11KB
MD53e6bf00b3ac976122f982ae2aadb1c51
SHA1caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
SHA2564ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
SHA5121286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
Filesize
64KB
MD5e5e5036287781d815c871fc9effe211e
SHA1afc8299298f23ace8822369ad6787d42d8084232
SHA2561b9ee011b5dcc1b506e9f4ddbf88995d7f627b0841af72bfec7ea8cf278eeab8
SHA512d7932c6e5256a6a73e01c1595901e329db14ffec7a9df16be181b12a555a5a6331085feba515f34772a4a86d773c8bc84abc14543cf13dd6667cc9f2d309e4cf
-
Filesize
129KB
MD556ee80321284606fd48e602a2bf8df71
SHA17a8d400be7e7940c590625a507aba340e0fad0e7
SHA2565b728496b55d10f64e26ae76782c10cee898d819d27edcd5a297f1fd310988b4
SHA51298d0b1e429c8c4bbe794fa2e267b6fc3bedfe240c30004645821a47dd999bcf44d840f22af101b5605966f0112ed85d1934cdb88cbef36658a6d8c63ab252063