Overview
overview
10Static
static
30044af802e...18.exe
windows7-x64
100044af802e...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3AdapterUtils.js
windows7-x64
3AdapterUtils.js
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7yKVGLQ9WeD.html
windows7-x64
3yKVGLQ9WeD.html
windows10-2004-x64
3General
-
Target
0044af802e1c33f11e158025c10eacc5_JaffaCakes118
-
Size
269KB
-
Sample
240930-jtpzhstepm
-
MD5
0044af802e1c33f11e158025c10eacc5
-
SHA1
ef879a411e080727f0cdebadc84667db2cf61d80
-
SHA256
0644252f19a715f2c0733f912ed4dfacaf36b48caad6a69b472ab81fb0f72b81
-
SHA512
c5ede5b79cfd09525a860a7fde8694f0a6b9b8169b83545beb9f1cb6567ba4e9b56fc62d12a7d9ce9056293c3ad9de829d0e902f1f0ef5a457aba0298ed028dd
-
SSDEEP
6144:Dy9v17kwzx0Kpu2gZiUYg3bWTlEvZ5r/2iSYP8HjwsAmfA0yCCyh+6kQ8:e97kG0Kp1eiUOG2iSYKjwsA2TM6kh
Static task
static1
Behavioral task
behavioral1
Sample
0044af802e1c33f11e158025c10eacc5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0044af802e1c33f11e158025c10eacc5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
AdapterUtils.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
AdapterUtils.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
yKVGLQ9WeD.html
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
yKVGLQ9WeD.html
Resource
win10v2004-20240910-en
Malware Config
Extracted
C:\Users\Admin\Pictures\_README_.hta
Targets
-
-
Target
0044af802e1c33f11e158025c10eacc5_JaffaCakes118
-
Size
269KB
-
MD5
0044af802e1c33f11e158025c10eacc5
-
SHA1
ef879a411e080727f0cdebadc84667db2cf61d80
-
SHA256
0644252f19a715f2c0733f912ed4dfacaf36b48caad6a69b472ab81fb0f72b81
-
SHA512
c5ede5b79cfd09525a860a7fde8694f0a6b9b8169b83545beb9f1cb6567ba4e9b56fc62d12a7d9ce9056293c3ad9de829d0e902f1f0ef5a457aba0298ed028dd
-
SSDEEP
6144:Dy9v17kwzx0Kpu2gZiUYg3bWTlEvZ5r/2iSYP8HjwsAmfA0yCCyh+6kQ8:e97kG0Kp1eiUOG2iSYKjwsA2TM6kh
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (520) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/StartMenu.dll
-
Size
7KB
-
MD5
af0669fde3204c7bb0c6dbdd925ab008
-
SHA1
1c7af002be85d6778a021a1c1b9249a074573a3e
-
SHA256
388373f8e77d1c6eceb0c5997905a4baa49cd090981c1fbb79cd6f590ddb8c19
-
SHA512
c86b32772ed9807aad58a67a4b4efed5eb9a511519b196e50a549f87a9c2384d4e700bbebf849e839f947aa5fef818943feb77c0e1f8111fcd0279015c1c5df9
-
SSDEEP
96:C8dPIKJhMuhik+CfoEwknt6io8zv+qy5/utta/R3lkCTcaqHCI:rZIKXgk+cx6QYFkAVlncviI
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
ca332bb753b0775d5e806e236ddcec55
-
SHA1
f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
-
SHA256
df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
-
SHA512
2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
SSDEEP
192:eo24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol6Sl:k8QIl975eXqlWBrz7YLOl6
Score3/10 -
-
-
Target
AdapterUtils.js
-
Size
2KB
-
MD5
87a454971f94e7cdaf9c52ad0bc4ed90
-
SHA1
b9f8f89c55a6b44df7f71b429ddcf8e5baca3f13
-
SHA256
2100600a1f2251f81946b6095d8c6048ef78516e00360ad8eb3eef4deb055517
-
SHA512
03a203685c9577ea156e5aa502c127d23423b32700f25e91e9bf9b85843f41d5687454e4789a95e05d7ef8a6123b139133b0e49a0aa2499e2362ceddd5a4220c
Score3/10 -
-
-
Target
Uninstall.exe
-
Size
51KB
-
MD5
56b6009ad6d0c79fbb5d0d8363701c63
-
SHA1
05c448304b558d6c1762e4b53f368315f29e8794
-
SHA256
1c9a4582dfd8cd00f9ccce0dc609094b955f03952606c18427c2080e33834f30
-
SHA512
54c2121bc385294e6513328c07866317f25c258a4cd06e491ec1e2027431f74e9b4fab16104010d221356e7949c149189035c0ce845a0f7e8f41e13082bd66ba
-
SSDEEP
1536:qrsKlcypDv17knJGq90D2YzIegdLeAyNxOMra:QsKWy9v17kwBD2YzIeceANKa
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
yKVGLQ9WeD
-
Size
348B
-
MD5
556fa9ef4c895075c2d0f63053c16a34
-
SHA1
dc372fb233c6de9ecca9e616621f88d3c373e2ab
-
SHA256
8fb91bab32ad70ce6d5dd747959ed867b92070e093320416ea5678a6ef16ef8c
-
SHA512
ec89605e062f88190ae5780e8fb16e2c0d5e50938cee826aa4ea9a95d251c0833910382186a2eca0af5a88bd298ae33d14c24515e609e917bed067e50c8f4bf5
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Windows Management Instrumentation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1