Overview
overview
10Static
static
3ee8bca478d...18.exe
windows7-x64
10ee8bca478d...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3500.htm
windows7-x64
3500.htm
windows10-2004-x64
3DumpLog.dll
windows7-x64
3DumpLog.dll
windows10-2004-x64
3General
-
Target
ee8bca478d4c26182df5a6aebddb4474_JaffaCakes118
-
Size
266KB
-
Sample
240920-2c9ayasann
-
MD5
ee8bca478d4c26182df5a6aebddb4474
-
SHA1
bebf16741938ee0e8383c0c33bc2f4baf857a6b8
-
SHA256
078b158ca33a1eefb800fe63c2eebe8a85b1bf1f0c2099ab2b33a60054beb831
-
SHA512
c069fb54eaf1ef19b109f6a377f0a8126f592061f9b39092020be3834c9a8a6ee3695c9ea358e69a605243ff269cfaedfcb5c829a8d4c7a3ae5c3b66a16645ec
-
SSDEEP
6144:BwHysO+JxXMjJc+8sv79YsdL5BDnrTOY2Kw:qO+JNWJXYuL5B7OYm
Static task
static1
Behavioral task
behavioral1
Sample
ee8bca478d4c26182df5a6aebddb4474_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee8bca478d4c26182df5a6aebddb4474_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
500.htm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
500.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
DumpLog.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DumpLog.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
http://52uo5k3t73ypjije.249isv.bid/8863-51A8-6216-0046-1FD6
http://52uo5k3t73ypjije.tc7j6w.bid/8863-51A8-6216-0046-1FD6
http://52uo5k3t73ypjije.o8hpwj.top/8863-51A8-6216-0046-1FD6
http://52uo5k3t73ypjije.gg4dgp.bid/8863-51A8-6216-0046-1FD6
http://52uo5k3t73ypjije.onion.to/8863-51A8-6216-0046-1FD6
http://52uo5k3t73ypjije.onion/8863-51A8-6216-0046-1FD6
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.html
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
http://52uo5k3t73ypjije.249isv.bid/7851-F04D-61C4-0046-197C
http://52uo5k3t73ypjije.tc7j6w.bid/7851-F04D-61C4-0046-197C
http://52uo5k3t73ypjije.o8hpwj.top/7851-F04D-61C4-0046-197C
http://52uo5k3t73ypjije.gg4dgp.bid/7851-F04D-61C4-0046-197C
http://52uo5k3t73ypjije.onion.to/7851-F04D-61C4-0046-197C
http://52uo5k3t73ypjije.onion/7851-F04D-61C4-0046-197C
Targets
-
-
Target
ee8bca478d4c26182df5a6aebddb4474_JaffaCakes118
-
Size
266KB
-
MD5
ee8bca478d4c26182df5a6aebddb4474
-
SHA1
bebf16741938ee0e8383c0c33bc2f4baf857a6b8
-
SHA256
078b158ca33a1eefb800fe63c2eebe8a85b1bf1f0c2099ab2b33a60054beb831
-
SHA512
c069fb54eaf1ef19b109f6a377f0a8126f592061f9b39092020be3834c9a8a6ee3695c9ea358e69a605243ff269cfaedfcb5c829a8d4c7a3ae5c3b66a16645ec
-
SSDEEP
6144:BwHysO+JxXMjJc+8sv79YsdL5BDnrTOY2Kw:qO+JNWJXYuL5B7OYm
-
Modifies visiblity of hidden/system files in Explorer
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Adds policy Run key to start application
-
Contacts a large (524) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
2a03c4a7ac5ee5e0e0a683949f70971b
-
SHA1
3bd9877caaea4804c0400420494ad1143179dcec
-
SHA256
d4f0042d8e7622b7e14395e926dd02edab3cdc77e82d88108b67a4d2cee9229b
-
SHA512
1942cdb522859f8dba46824786e361794a62e6201279201e1e0e2e07499fb6252933c5661782fccd77291c3650cafb2a7a08eee5431c8238f0da44840ee4c476
-
SSDEEP
192:y4n3T5aK+dHCMR1aQR9RuZl3WWmU7WYZsw1JpVGnrjdK72dwF7dBOne:Tn3T5KdHCMRD/R1cOnrjd+BO
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
6f5257c0b8c0ef4d440f4f4fce85fb1b
-
SHA1
b6ac111dfb0d1fc75ad09c56bde7830232395785
-
SHA256
b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
-
SHA512
a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
SSDEEP
96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
Score3/10 -
-
-
Target
500.htm
-
Size
1KB
-
MD5
af35cc4818a5c71b23b3458d91951293
-
SHA1
91e32267493a44e0bbbaeacf7cf20e6d6095430b
-
SHA256
6836c2e7c6237059fb0dde27a99dcd70c25346de2357d8723cbc21be92d71e8e
-
SHA512
78d3db830c1fb85ec6244fe8731f9d8521c4ac0f0ad0ca9fad77941036eff634bd6cb12895653519cb2291f791dc3b9dc6e9592f7d78ddc50f4fb47665cf17ce
Score3/10 -
-
-
Target
DumpLog.dll
-
Size
100KB
-
MD5
44074cbeffc3e2e64a3f07749b58dd50
-
SHA1
a7827f6a0362a2e56bfef39967c04901389b23ce
-
SHA256
da1e9cd26dce1d3e49bbcc6f23b7579a8f9015f72662e4ea3db331ce21654be4
-
SHA512
12c5a1ba9d32e3222384565d080d7a4eb166cc0c5af5e1ff483e3d6a26c428ae44a05fc5ea98d287a549f041c1eaccc061ce067508a6876064fb8168e63ed37a
-
SSDEEP
3072:t81wmjCHKwdvQlxN/lB+s+EWg4lciRndxIUH:tIaKSvQlxN/R+EW+4dx
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
5Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1