Analysis
-
max time kernel
132s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Arrays.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Arrays.dll
Resource
win10v2004-20240802-en
General
-
Target
f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe
-
Size
271KB
-
MD5
f1a79f9cba710bf8cc11122d6999d66d
-
SHA1
3756af4d51bb0511e5ef4319eaf7720b4c73194b
-
SHA256
b6cb0ed4ec3397234c1f67bef483ee62f45ca9d1becca3fa0c9fcbe3642acf9a
-
SHA512
3394ad10858ec3161c2e084f79a22ce74d6c1102581af4ef6576ec78eabe82fc9f5ee6c248d1389927a983c4385e905a5c559d711100bd391b6b80f76943c8ed
-
SSDEEP
6144:Kn/L+GOm9pZ9rBzo/pwwIIg8I32PkFVEXS:0zOm9r99/8y2PSaS
Malware Config
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\README.hta
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (526) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe -
Loads dropped DLL 3 IoCs
pid Process 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpEE14.bmp" f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3056 set thread context of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\PLANNERS.ONE f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BUSINESS.ONE f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\BLANK.ONE f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\README.hta f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\ACADEMIC.ONE f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\DESIGNER.ONE f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1372 PING.EXE -
Kills process with taskkill 1 IoCs
pid Process 1504 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1372 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4356 WMIC.exe Token: SeSecurityPrivilege 4356 WMIC.exe Token: SeTakeOwnershipPrivilege 4356 WMIC.exe Token: SeLoadDriverPrivilege 4356 WMIC.exe Token: SeSystemProfilePrivilege 4356 WMIC.exe Token: SeSystemtimePrivilege 4356 WMIC.exe Token: SeProfSingleProcessPrivilege 4356 WMIC.exe Token: SeIncBasePriorityPrivilege 4356 WMIC.exe Token: SeCreatePagefilePrivilege 4356 WMIC.exe Token: SeBackupPrivilege 4356 WMIC.exe Token: SeRestorePrivilege 4356 WMIC.exe Token: SeShutdownPrivilege 4356 WMIC.exe Token: SeDebugPrivilege 4356 WMIC.exe Token: SeSystemEnvironmentPrivilege 4356 WMIC.exe Token: SeRemoteShutdownPrivilege 4356 WMIC.exe Token: SeUndockPrivilege 4356 WMIC.exe Token: SeManageVolumePrivilege 4356 WMIC.exe Token: 33 4356 WMIC.exe Token: 34 4356 WMIC.exe Token: 35 4356 WMIC.exe Token: 36 4356 WMIC.exe Token: SeIncreaseQuotaPrivilege 4356 WMIC.exe Token: SeSecurityPrivilege 4356 WMIC.exe Token: SeTakeOwnershipPrivilege 4356 WMIC.exe Token: SeLoadDriverPrivilege 4356 WMIC.exe Token: SeSystemProfilePrivilege 4356 WMIC.exe Token: SeSystemtimePrivilege 4356 WMIC.exe Token: SeProfSingleProcessPrivilege 4356 WMIC.exe Token: SeIncBasePriorityPrivilege 4356 WMIC.exe Token: SeCreatePagefilePrivilege 4356 WMIC.exe Token: SeBackupPrivilege 4356 WMIC.exe Token: SeRestorePrivilege 4356 WMIC.exe Token: SeShutdownPrivilege 4356 WMIC.exe Token: SeDebugPrivilege 4356 WMIC.exe Token: SeSystemEnvironmentPrivilege 4356 WMIC.exe Token: SeRemoteShutdownPrivilege 4356 WMIC.exe Token: SeUndockPrivilege 4356 WMIC.exe Token: SeManageVolumePrivilege 4356 WMIC.exe Token: 33 4356 WMIC.exe Token: 34 4356 WMIC.exe Token: 35 4356 WMIC.exe Token: 36 4356 WMIC.exe Token: SeBackupPrivilege 4308 vssvc.exe Token: SeRestorePrivilege 4308 vssvc.exe Token: SeAuditPrivilege 4308 vssvc.exe Token: 33 4084 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4084 AUDIODG.EXE Token: SeDebugPrivilege 1504 taskkill.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 3056 wrote to memory of 4408 3056 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 88 PID 4408 wrote to memory of 3244 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 91 PID 4408 wrote to memory of 3244 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 91 PID 3244 wrote to memory of 4356 3244 cmd.exe 93 PID 3244 wrote to memory of 4356 3244 cmd.exe 93 PID 4408 wrote to memory of 2064 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 99 PID 4408 wrote to memory of 2064 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 99 PID 4408 wrote to memory of 2064 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 99 PID 4408 wrote to memory of 3756 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 100 PID 4408 wrote to memory of 3756 4408 f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe 100 PID 3756 wrote to memory of 1504 3756 cmd.exe 102 PID 3756 wrote to memory of 1504 3756 cmd.exe 102 PID 3756 wrote to memory of 1372 3756 cmd.exe 104 PID 3756 wrote to memory of 1372 3756 cmd.exe 104 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\system32\wbem\WMIC.exeC:\Windows\system32\wbem\wmic.exe shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\README.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\system32\taskkill.exetaskkill /f /im "f1a79f9cba710bf8cc11122d6999d66d_JaffaCakes118.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1372
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4dc 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
102KB
MD553b475200fd923b7dee70ea8b213b096
SHA16f6c4a51f57cde10a00523fd1e5c6b8941c11f8a
SHA25643e3d1893e027ce4858e5ffcdd1eebf66d3d63a8468a9cd321faeefa6f2a7ad5
SHA5123f040a619b5fabe3fe2d6d98c5e627464e7e2c75dc633da6402549c6513805ba65ac0263f2450563b1191fe0baa74650eacb187dc11a32d0f33927ab9c354b1e
-
Filesize
1KB
MD5506b088bd66478ee8fc5234cdee784f9
SHA191abc3a8c09b03ae31a9fae614c0604f09c1a9ad
SHA2564b076e639a30056e2ffa6f3e5002ca3c754cdcdcde101ef89605b263b8ccf4c1
SHA5129372df2806c5e2e5b332bf71df480d52ebea640ddf532a32a732589c744011cacbbc0ef944c6138ee9ffb3b7a0a47751d29498da23a3fcb9c59f422bfa9f52e6
-
Filesize
60KB
MD59f8b57116c369e958e266270dc8dc3a3
SHA1c3edacd58fd640c30e79a40b00f927d828d82bef
SHA25639b6ff4f0eea07492f79198ae0d531c4a1e0b03676c67523123b2d954198c590
SHA5128fd38006264e33e6a6389af6e7bde1638e64c7ab0a7d7b90c455bc5274e6269bce56c2dad4e7373f5477f712e30bde94aaf62002acb2896a69d8af4a34d54ced