General
-
Target
63eb6d25da4faafe6c3374a2adf13f2f_JaffaCakes118
-
Size
215KB
-
Sample
241020-x73pesxhkq
-
MD5
63eb6d25da4faafe6c3374a2adf13f2f
-
SHA1
092524f26dfd6db0dc9cd0d70e0d1423e7e23ce7
-
SHA256
4caeec5af56057abd2d91038f4ab8042fca6af4ad1ddd4e37d83501688e46b71
-
SHA512
d1df810686a3843c6aebf3133a3b10370cd9f136d3dd591c1d1ebff7730b58fe69a83dbccd26d30b8e2434cd65ba3a9c47e8a7ae52c7c5adf93c5100e0806634
-
SSDEEP
6144:fwHys246szpuXQP/Y5WqOR+d2HZKzN393ipm0:E2gzpuXdsNcdgKzNNs
Static task
static1
Behavioral task
behavioral1
Sample
63eb6d25da4faafe6c3374a2adf13f2f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
63eb6d25da4faafe6c3374a2adf13f2f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
edge.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
edge.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\_README_2SID_.hta
Extracted
C:\Users\Admin\Music\_README_NL7O3_.hta
Targets
-
-
Target
63eb6d25da4faafe6c3374a2adf13f2f_JaffaCakes118
-
Size
215KB
-
MD5
63eb6d25da4faafe6c3374a2adf13f2f
-
SHA1
092524f26dfd6db0dc9cd0d70e0d1423e7e23ce7
-
SHA256
4caeec5af56057abd2d91038f4ab8042fca6af4ad1ddd4e37d83501688e46b71
-
SHA512
d1df810686a3843c6aebf3133a3b10370cd9f136d3dd591c1d1ebff7730b58fe69a83dbccd26d30b8e2434cd65ba3a9c47e8a7ae52c7c5adf93c5100e0806634
-
SSDEEP
6144:fwHys246szpuXQP/Y5WqOR+d2HZKzN393ipm0:E2gzpuXdsNcdgKzNNs
Score10/10-
Blocklisted process makes network request
-
Contacts a large (584) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a436db0c473a087eb61ff5c53c34ba27
-
SHA1
65ea67e424e75f5065132b539c8b2eda88aa0506
-
SHA256
75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
-
SHA512
908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
SSDEEP
192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e
Score3/10 -
-
-
Target
edge.dll
-
Size
36KB
-
MD5
4387d9d16fdfb611f0f6078f11f14134
-
SHA1
703d9edf19e314e2c5c9bd2c46fe4015bb5e6a63
-
SHA256
21b1048ff06ab947b4c57624c06220c3668c8934f51712a549edff18ce70038d
-
SHA512
a437ea0e80fbb749dc587ff1b3146880e9e9cfe4fd651df4ae81678c09db595abb98832abfc77c403f393671f2c6d4116d71f1981eb88e29d24ea04840d0197d
-
SSDEEP
768:yMLk3UBHFci82EToC+Gs2//3e/TMY1Y2QWB81y:K8HF7PEToNGs23DIG1y
Score3/10 -