Overview
overview
10Static
static
3eed8047cf5...18.exe
windows7-x64
10eed8047cf5...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7General
-
Target
eed8047cf5ee197d4e480aaef70f9eba_JaffaCakes118
-
Size
261KB
-
Sample
240921-b8mtpszcnm
-
MD5
eed8047cf5ee197d4e480aaef70f9eba
-
SHA1
5963424c41cee2aa0d77c9fbd5b598c3e539455f
-
SHA256
1693c7d8cf8a6173afc8e613a6949dcc189dc6fe8bc5ac34a06ad2ab866a702d
-
SHA512
40906dbbf9e2215d6c775aab27411f22cd5e6e1850196e19a2c546ee4d09275c2307984c6806b8c5780d56e3679908bde88a86cc578094791ce47968a96ecea2
-
SSDEEP
6144:eW+7+eM+Ma8jeHzbgnYNzmC6SanC9MGn4MN0xIhdxuV:eRFMZobvNzl6rnCys4+0yhdxuV
Static task
static1
Behavioral task
behavioral1
Sample
eed8047cf5ee197d4e480aaef70f9eba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eed8047cf5ee197d4e480aaef70f9eba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
uninstall.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Contacts\README.hta
Targets
-
-
Target
eed8047cf5ee197d4e480aaef70f9eba_JaffaCakes118
-
Size
261KB
-
MD5
eed8047cf5ee197d4e480aaef70f9eba
-
SHA1
5963424c41cee2aa0d77c9fbd5b598c3e539455f
-
SHA256
1693c7d8cf8a6173afc8e613a6949dcc189dc6fe8bc5ac34a06ad2ab866a702d
-
SHA512
40906dbbf9e2215d6c775aab27411f22cd5e6e1850196e19a2c546ee4d09275c2307984c6806b8c5780d56e3679908bde88a86cc578094791ce47968a96ecea2
-
SSDEEP
6144:eW+7+eM+Ma8jeHzbgnYNzmC6SanC9MGn4MN0xIhdxuV:eRFMZobvNzl6rnCys4+0yhdxuV
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (518) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
3e6bf00b3ac976122f982ae2aadb1c51
-
SHA1
caab188f7fdc84d3fdcb2922edeeb5ed576bd31d
-
SHA256
4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe
-
SHA512
1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706
-
SSDEEP
192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb
Score3/10 -
-
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
dbdbf4017ff91c9de328697b5fd2e10a
-
SHA1
b597a5e9a8a0b252770933feed51169b5060a09f
-
SHA256
be60a00f32924ccbe03f9914e33b8e1ad8c8a1ca442263a69896efba74925b36
-
SHA512
3befc15aab0a5dbe7fde96155b0499d385f2799b1a2d47ce04f37b5804006b1c6c4fff93d3cedb56a2a8172b23752b6f9dc6168cfce3596b91def3247836cf10
-
SSDEEP
96:33YnIxFkDUGZpKSmktse3GpmD8pevbE9cxSgB5PKtAtYE9v5E9KntrmfVEB3YdkS:33YIvGZDdtP8pevbg0PuAYK56NyoIFI
Score3/10 -
-
-
Target
uninstall.exe
-
Size
61KB
-
MD5
cacf4263c85b7d248ea859aada7a39c8
-
SHA1
efc3eddb232e6b69429beb55e3bcc1fd0192df02
-
SHA256
54cdea09145a7822be8215c105609d0e501ddaf4078f0ca9189be9d96781c939
-
SHA512
540949b68b6e72116f4a9ee4d134ecd7c71fa6b57029e0edc1bb0122f444aabfb400607567192a47f8909699b93ce59f10d9b776950ff99ddc8e25a42b4db6a6
-
SSDEEP
1536:ejoUxZbE+HOI66qkryz9zIMg/EW58gL0AzCVhN9:edxNE+Hb+eyz9zIMeEW530AYz
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-