General
-
Target
f32646de4d0e3c0ca559604225ae471a_JaffaCakes118
-
Size
445KB
-
Sample
240924-jkahgawdpp
-
MD5
f32646de4d0e3c0ca559604225ae471a
-
SHA1
30e51a5170640ee79b65604d51d4f9a1c202110a
-
SHA256
877f9d77a44b29ff07a67fd2d61fe0e2653c317cee58b1f59f63b6d7f9266bb6
-
SHA512
cff7d7b8bb60794eaca10908c6260384da02eafed1ed858d58383c3cca4f973de7c118f439c60437ce5ceba4a7e88a10d018e8e5da7192141c8a3405f171deaf
-
SSDEEP
6144:nj4aJgQ6NTzZhu+Ywh3XofITS80ghHa4t1BYNk83ZbTNovPsd8Hs88:j/SFZoMh3X3Td0yFt1h8J5GO8M88
Static task
static1
Behavioral task
behavioral1
Sample
f32646de4d0e3c0ca559604225ae471a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f32646de4d0e3c0ca559604225ae471a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THIS_FILE_CNUBBZC_.txt
http://p27dokhpz2n7nvgr.onion/4BD6-4194-6637-0098-731A
http://p27dokhpz2n7nvgr.1hpvzl.top/4BD6-4194-6637-0098-731A
http://p27dokhpz2n7nvgr.1pglcs.top/4BD6-4194-6637-0098-731A
http://p27dokhpz2n7nvgr.1cewld.top/4BD6-4194-6637-0098-731A
http://p27dokhpz2n7nvgr.1js3tl.top/4BD6-4194-6637-0098-731A
http://p27dokhpz2n7nvgr.1ajohk.top/4BD6-4194-6637-0098-731A
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THIS_FILE_KUBJ7_.txt
http://p27dokhpz2n7nvgr.onion/9E57-2BD9-E613-0098-7244
http://p27dokhpz2n7nvgr.1hpvzl.top/9E57-2BD9-E613-0098-7244
http://p27dokhpz2n7nvgr.1pglcs.top/9E57-2BD9-E613-0098-7244
http://p27dokhpz2n7nvgr.1cewld.top/9E57-2BD9-E613-0098-7244
http://p27dokhpz2n7nvgr.1js3tl.top/9E57-2BD9-E613-0098-7244
http://p27dokhpz2n7nvgr.1ajohk.top/9E57-2BD9-E613-0098-7244
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THIS_FILE_VI84_.hta
cerber
Targets
-
-
Target
f32646de4d0e3c0ca559604225ae471a_JaffaCakes118
-
Size
445KB
-
MD5
f32646de4d0e3c0ca559604225ae471a
-
SHA1
30e51a5170640ee79b65604d51d4f9a1c202110a
-
SHA256
877f9d77a44b29ff07a67fd2d61fe0e2653c317cee58b1f59f63b6d7f9266bb6
-
SHA512
cff7d7b8bb60794eaca10908c6260384da02eafed1ed858d58383c3cca4f973de7c118f439c60437ce5ceba4a7e88a10d018e8e5da7192141c8a3405f171deaf
-
SSDEEP
6144:nj4aJgQ6NTzZhu+Ywh3XofITS80ghHa4t1BYNk83ZbTNovPsd8Hs88:j/SFZoMh3X3Td0yFt1h8J5GO8M88
-
Blocklisted process makes network request
-
Contacts a large (1095) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2