General
-
Target
f1ff2d72696f37e5187cfa8d82dfab3d_JaffaCakes118
-
Size
382KB
-
Sample
240922-pdfc2aygph
-
MD5
f1ff2d72696f37e5187cfa8d82dfab3d
-
SHA1
6cf875c46686d1aaddec0872530cc6b5c78d1ad0
-
SHA256
5f4935c0ec2474fbc43f715594dcf1ee02af4aa11175d01f5d67cfb06db00a80
-
SHA512
7931c5d6d67cd09680210e85c79aa89e47e43cafe87d9328458e227f182b0d32aa84680afa1e3e12c4a8c19c75022c4392dc35496bd20c8617e4391fb5d617a1
-
SSDEEP
6144:7D6xtFPCroUrWOuAMP9L3n+NOE4RiLvDUUfbWQV0v5IljNCyZ4ZT:7+xtFCEpF3+NO/iLvDUMqc5Ct
Static task
static1
Behavioral task
behavioral1
Sample
f1ff2d72696f37e5187cfa8d82dfab3d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1ff2d72696f37e5187cfa8d82dfab3d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_4FGR094W_.txt
http://p27dokhpz2n7nvgr.onion/55E7-A12A-355C-0446-9257
http://p27dokhpz2n7nvgr.1nhkou.top/55E7-A12A-355C-0446-9257
http://p27dokhpz2n7nvgr.1a7wnt.top/55E7-A12A-355C-0446-9257
http://p27dokhpz2n7nvgr.1czh7o.top/55E7-A12A-355C-0446-9257
http://p27dokhpz2n7nvgr.1hpvzl.top/55E7-A12A-355C-0446-9257
http://p27dokhpz2n7nvgr.1pglcs.top/55E7-A12A-355C-0446-9257
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_YLF7MR1X_.hta
cerber
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_0JOXS_.txt
http://p27dokhpz2n7nvgr.onion/B644-4C8A-0620-0446-9723
http://p27dokhpz2n7nvgr.1nhkou.top/B644-4C8A-0620-0446-9723
http://p27dokhpz2n7nvgr.1a7wnt.top/B644-4C8A-0620-0446-9723
http://p27dokhpz2n7nvgr.1czh7o.top/B644-4C8A-0620-0446-9723
http://p27dokhpz2n7nvgr.1hpvzl.top/B644-4C8A-0620-0446-9723
http://p27dokhpz2n7nvgr.1pglcs.top/B644-4C8A-0620-0446-9723
Targets
-
-
Target
f1ff2d72696f37e5187cfa8d82dfab3d_JaffaCakes118
-
Size
382KB
-
MD5
f1ff2d72696f37e5187cfa8d82dfab3d
-
SHA1
6cf875c46686d1aaddec0872530cc6b5c78d1ad0
-
SHA256
5f4935c0ec2474fbc43f715594dcf1ee02af4aa11175d01f5d67cfb06db00a80
-
SHA512
7931c5d6d67cd09680210e85c79aa89e47e43cafe87d9328458e227f182b0d32aa84680afa1e3e12c4a8c19c75022c4392dc35496bd20c8617e4391fb5d617a1
-
SSDEEP
6144:7D6xtFPCroUrWOuAMP9L3n+NOE4RiLvDUUfbWQV0v5IljNCyZ4ZT:7+xtFCEpF3+NO/iLvDUMqc5Ct
-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2