Overview
overview
10Static
static
3fa8dff8ebe...18.exe
windows7-x64
10fa8dff8ebe...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3404-13.htm
windows7-x64
3404-13.htm
windows10-2004-x64
3SFhelper.dll
windows7-x64
3SFhelper.dll
windows10-2004-x64
3dash.js
windows7-x64
3dash.js
windows10-2004-x64
3General
-
Target
fa8dff8ebe3d919ebc72ed83c58a2351_JaffaCakes118
-
Size
253KB
-
Sample
240927-rj72cawelp
-
MD5
fa8dff8ebe3d919ebc72ed83c58a2351
-
SHA1
f98a4f7bd317a4a90790bdff2d13fdb8291c6357
-
SHA256
33b8c7c3d12e03465f4438e5431b0801dff1cfc8b16534619c009ac4387fc7e6
-
SHA512
8f5ecc6863b845cfc6ba86026b8771a3a43a923a92f054661e6d10013961d92d833c49626de02a9aa9a6592374c5f8987eba1d9fe747dc9b83d7b4a1419f5cda
-
SSDEEP
6144:UEcNCL4CqbmP+xNaYlQdmipcCYG2R7MmZFUDz7GJM:jL4CamP8FlQFC+m0v6JM
Static task
static1
Behavioral task
behavioral1
Sample
fa8dff8ebe3d919ebc72ed83c58a2351_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa8dff8ebe3d919ebc72ed83c58a2351_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
404-13.htm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
404-13.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
SFhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
SFhelper.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
dash.js
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
dash.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://pmenboeqhyrpvomq.pap44w.top/BB8A-A708-A3BC-006D-F998
http://pmenboeqhyrpvomq.0vgu64.top/BB8A-A708-A3BC-006D-F998
http://pmenboeqhyrpvomq.y5j7e6.top/BB8A-A708-A3BC-006D-F998
http://pmenboeqhyrpvomq.daigy0.top/BB8A-A708-A3BC-006D-F998
http://pmenboeqhyrpvomq.onion.to/BB8A-A708-A3BC-006D-F998
http://pmenboeqhyrpvomq.onion/BB8A-A708-A3BC-006D-F998
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.txt
cerber
http://pmenboeqhyrpvomq.pap44w.top/3F32-353C-C8F5-006D-FB0A
http://pmenboeqhyrpvomq.0vgu64.top/3F32-353C-C8F5-006D-FB0A
http://pmenboeqhyrpvomq.y5j7e6.top/3F32-353C-C8F5-006D-FB0A
http://pmenboeqhyrpvomq.daigy0.top/3F32-353C-C8F5-006D-FB0A
http://pmenboeqhyrpvomq.onion.to/3F32-353C-C8F5-006D-FB0A
http://pmenboeqhyrpvomq.onion/3F32-353C-C8F5-006D-FB0A
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Targets
-
-
Target
fa8dff8ebe3d919ebc72ed83c58a2351_JaffaCakes118
-
Size
253KB
-
MD5
fa8dff8ebe3d919ebc72ed83c58a2351
-
SHA1
f98a4f7bd317a4a90790bdff2d13fdb8291c6357
-
SHA256
33b8c7c3d12e03465f4438e5431b0801dff1cfc8b16534619c009ac4387fc7e6
-
SHA512
8f5ecc6863b845cfc6ba86026b8771a3a43a923a92f054661e6d10013961d92d833c49626de02a9aa9a6592374c5f8987eba1d9fe747dc9b83d7b4a1419f5cda
-
SSDEEP
6144:UEcNCL4CqbmP+xNaYlQdmipcCYG2R7MmZFUDz7GJM:jL4CamP8FlQFC+m0v6JM
-
Adds policy Run key to start application
-
Contacts a large (521) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
2a03c4a7ac5ee5e0e0a683949f70971b
-
SHA1
3bd9877caaea4804c0400420494ad1143179dcec
-
SHA256
d4f0042d8e7622b7e14395e926dd02edab3cdc77e82d88108b67a4d2cee9229b
-
SHA512
1942cdb522859f8dba46824786e361794a62e6201279201e1e0e2e07499fb6252933c5661782fccd77291c3650cafb2a7a08eee5431c8238f0da44840ee4c476
-
SSDEEP
192:y4n3T5aK+dHCMR1aQR9RuZl3WWmU7WYZsw1JpVGnrjdK72dwF7dBOne:Tn3T5KdHCMRD/R1cOnrjd+BO
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
6f5257c0b8c0ef4d440f4f4fce85fb1b
-
SHA1
b6ac111dfb0d1fc75ad09c56bde7830232395785
-
SHA256
b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
-
SHA512
a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
SSDEEP
96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
Score3/10 -
-
-
Target
404-13.htm
-
Size
1KB
-
MD5
0267ef0118f917681a00b350c9e6911f
-
SHA1
314e8f5329983d234959a4f7e94736d99d039d12
-
SHA256
7bad2da380f6fa6f9aebdea5a0350d377086cc68a04b92b68b32b0b272719e92
-
SHA512
2b4eab9fef989f1d325546b1deaa9a40f1a421e619bc9cbb757abf20ba8e7b7ff236fda375b40983f3b7a6fac2a04b6b803bf8e0d0e1d5558a171eea14000a88
Score3/10 -
-
-
Target
SFhelper.dll
-
Size
79KB
-
MD5
0e8e72d3531cecec1518d1c3929671d6
-
SHA1
5e7153adfea4cffa64dbbd8caf78f0e50f6733a0
-
SHA256
8bf396d466b453d594cc7816884351261b5eb5602324a855953b45678bcc7254
-
SHA512
b4002806ef09c61bc50167e45407660e0564b54732ef70c88b1b8e4f43081ccd3468fa2fb07c7c8c2197bac66fd5ce3e7b42b0aa068f95385c7371b09cd98214
-
SSDEEP
1536:dWhUrksBwbhEnJU2BRs3xSmLcTCb+yxldk6tlm+8I5AVZbiGsGTRPx7:QAXB+EnC2fs3Joyfd/8uAV3RPx7
Score3/10 -
-
-
Target
dash.js
-
Size
750B
-
MD5
533b30fdbd4ab5d87fb8e2081f93b797
-
SHA1
7262676dd0af789afb53085f1b352455ace74552
-
SHA256
8ef1f3da84d39926c50645696bae8175d8465a64f2e51ffc35e9c50854d915b6
-
SHA512
93e97129fc6687be7eea739774f3524d3a5fb2e552aa8069b37d51524dfbff8928155b088ec019b85fc4b26597fceb1755b7cdc5c9d86ad7c401cdef91e2fdfa
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1