General
-
Target
faa343538216fe6c8e714ebb8ffc141c_JaffaCakes118
-
Size
244KB
-
Sample
240927-skw6xaybll
-
MD5
faa343538216fe6c8e714ebb8ffc141c
-
SHA1
87125b3c834d71fa211202fce5f23c0b9a2fd5ac
-
SHA256
407f184e29f751d364c0b48018a56c15fb0cb7d29cc047d9340600f7fef09fe3
-
SHA512
745b7e75a7c8f4a46c204bd7465452827e8d05f65c47576bc2652e880b6217f31cca5823ea211e77a8648624c6c58c8b6eef4037f9c8caaab017ba3cf4ce4c1a
-
SSDEEP
6144:Yn/L+VEuw+SfqPtJIgtcf9KrKI5SJD4+04Vgts:uaEuw+QqPtqg2srKoSX04Vgts
Static task
static1
Behavioral task
behavioral1
Sample
faa343538216fe6c8e714ebb8ffc141c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faa343538216fe6c8e714ebb8ffc141c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CabDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
CabDLL.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\README.hta
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\README.hta
Targets
-
-
Target
faa343538216fe6c8e714ebb8ffc141c_JaffaCakes118
-
Size
244KB
-
MD5
faa343538216fe6c8e714ebb8ffc141c
-
SHA1
87125b3c834d71fa211202fce5f23c0b9a2fd5ac
-
SHA256
407f184e29f751d364c0b48018a56c15fb0cb7d29cc047d9340600f7fef09fe3
-
SHA512
745b7e75a7c8f4a46c204bd7465452827e8d05f65c47576bc2652e880b6217f31cca5823ea211e77a8648624c6c58c8b6eef4037f9c8caaab017ba3cf4ce4c1a
-
SSDEEP
6144:Yn/L+VEuw+SfqPtJIgtcf9KrKI5SJD4+04Vgts:uaEuw+QqPtqg2srKoSX04Vgts
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (518) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a436db0c473a087eb61ff5c53c34ba27
-
SHA1
65ea67e424e75f5065132b539c8b2eda88aa0506
-
SHA256
75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
-
SHA512
908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
SSDEEP
192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e
Score3/10 -
-
-
Target
CabDLL.dll
-
Size
11KB
-
MD5
a4e290c0d88de000d90d0c9622168b93
-
SHA1
49d722fa296acf6dbf916a71c6da84afeb55e41a
-
SHA256
96af45cf0974c54544c9f1624c279864cc3d92bccc79be72b50af71176934796
-
SHA512
52dc0e8b5934df2b920f878d665b51a37ceca9efda0bf5e0de1c1915a0e27a0df7e2e22764dd32fc47ed15069cd8aab8ffc5ce0c328df2cea6d9d73a8aa7e44c
-
SSDEEP
96:zQEo053xQxbseavhkvIhvfBl0jPSYk0rGAtUEJKLmyh3Eyc3wnkNnk7csotznzR:krqAmBOP3k0qk1KCyh0inyNh
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1