General
-
Target
f4b584390544b4e2056577c4b527dabe_JaffaCakes118
-
Size
274KB
-
Sample
240924-3h7vqsvcmd
-
MD5
f4b584390544b4e2056577c4b527dabe
-
SHA1
ed639eabb63ed59a2ae4d7d537195af374de1eaa
-
SHA256
d0544bf7d26e9efe2844df033c1dba6c5f531f027c9772642e41643aedc6376a
-
SHA512
af4c8f84363bca0c8a70b1d19fa95f39c45307ced89b446727e7fb2d411e635f32f0666759d38f71918acdca19c0d72165717202478bc7ae506743222b2efca7
-
SSDEEP
6144:UL1B0OtJV0ys8+xt7KGtV68mFophbR8ga/2mp:UJmO+lDJV68miph12
Static task
static1
Behavioral task
behavioral1
Sample
f4b584390544b4e2056577c4b527dabe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4b584390544b4e2056577c4b527dabe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_ZK91QJ_.txt
http://p27dokhpz2n7nvgr.onion/40A2-AE6B-CE6F-0099-3B13
http://p27dokhpz2n7nvgr.1nhkou.top/40A2-AE6B-CE6F-0099-3B13
http://p27dokhpz2n7nvgr.1a7wnt.top/40A2-AE6B-CE6F-0099-3B13
http://p27dokhpz2n7nvgr.1czh7o.top/40A2-AE6B-CE6F-0099-3B13
http://p27dokhpz2n7nvgr.1hpvzl.top/40A2-AE6B-CE6F-0099-3B13
http://p27dokhpz2n7nvgr.1pglcs.top/40A2-AE6B-CE6F-0099-3B13
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_K9955H_.txt
http://p27dokhpz2n7nvgr.onion/7B1B-E0A6-B250-0099-30EF
http://p27dokhpz2n7nvgr.1nhkou.top/7B1B-E0A6-B250-0099-30EF
http://p27dokhpz2n7nvgr.1a7wnt.top/7B1B-E0A6-B250-0099-30EF
http://p27dokhpz2n7nvgr.1czh7o.top/7B1B-E0A6-B250-0099-30EF
http://p27dokhpz2n7nvgr.1hpvzl.top/7B1B-E0A6-B250-0099-30EF
http://p27dokhpz2n7nvgr.1pglcs.top/7B1B-E0A6-B250-0099-30EF
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_QHU7M3_.hta
cerber
Targets
-
-
Target
f4b584390544b4e2056577c4b527dabe_JaffaCakes118
-
Size
274KB
-
MD5
f4b584390544b4e2056577c4b527dabe
-
SHA1
ed639eabb63ed59a2ae4d7d537195af374de1eaa
-
SHA256
d0544bf7d26e9efe2844df033c1dba6c5f531f027c9772642e41643aedc6376a
-
SHA512
af4c8f84363bca0c8a70b1d19fa95f39c45307ced89b446727e7fb2d411e635f32f0666759d38f71918acdca19c0d72165717202478bc7ae506743222b2efca7
-
SSDEEP
6144:UL1B0OtJV0ys8+xt7KGtV68mFophbR8ga/2mp:UJmO+lDJV68miph12
-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2