Overview
overview
10Static
static
38a0c2641e4...18.exe
windows7-x64
108a0c2641e4...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Pwgen.dll
windows7-x64
3Pwgen.dll
windows10-2004-x64
3_.js
windows7-x64
3_.js
windows10-2004-x64
3General
-
Target
8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118
-
Size
244KB
-
Sample
241103-g5w6vswres
-
MD5
8a0c2641e45b3c5b473f69183c57cbf0
-
SHA1
8553f089e9d0b2eed4b7a1674ae568e4bc803db6
-
SHA256
14543e3fca12e0f56f2b88905ab0103ba4e049be8e9a12be30de38659ba8113c
-
SHA512
36dedb28aaae39019de8d45761377ae9156edece9513a4a9015f585132832049977a841ec7fee17764c0f6eda2afd2db65a369bbfa4686bc8ad09b559b5d2ae0
-
SSDEEP
6144:vkieBa28s1lxE2Xl9Kzh1CAyDDgHpEcHTXRnB8CteHR6+:TO8sbxE219mh1PyDDYWcRBtE
Static task
static1
Behavioral task
behavioral1
Sample
8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Pwgen.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Pwgen.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
_.js
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
_.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\# DECRYPT MY FILES #.txt
cerber
http://pmenboeqhyrpvomq.0vgu64.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.wz139z.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.r21wmw.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.pap44w.top/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.onion.to/7080-8D56-9DDD-006D-F923
http://pmenboeqhyrpvomq.onion/7080-8D56-9DDD-006D-F923
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
cerber
http://pmenboeqhyrpvomq.0vgu64.top/B05A-9EDB-ADDA-006D-F93F
http://pmenboeqhyrpvomq.wz139z.top/B05A-9EDB-ADDA-006D-F93F
http://pmenboeqhyrpvomq.r21wmw.top/B05A-9EDB-ADDA-006D-F93F
http://pmenboeqhyrpvomq.pap44w.top/B05A-9EDB-ADDA-006D-F93F
http://pmenboeqhyrpvomq.onion.to/B05A-9EDB-ADDA-006D-F93F
http://pmenboeqhyrpvomq.onion/B05A-9EDB-ADDA-006D-F93F
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Targets
-
-
Target
8a0c2641e45b3c5b473f69183c57cbf0_JaffaCakes118
-
Size
244KB
-
MD5
8a0c2641e45b3c5b473f69183c57cbf0
-
SHA1
8553f089e9d0b2eed4b7a1674ae568e4bc803db6
-
SHA256
14543e3fca12e0f56f2b88905ab0103ba4e049be8e9a12be30de38659ba8113c
-
SHA512
36dedb28aaae39019de8d45761377ae9156edece9513a4a9015f585132832049977a841ec7fee17764c0f6eda2afd2db65a369bbfa4686bc8ad09b559b5d2ae0
-
SSDEEP
6144:vkieBa28s1lxE2Xl9Kzh1CAyDDgHpEcHTXRnB8CteHR6+:TO8sbxE219mh1PyDDYWcRBtE
-
Cerber family
-
Adds policy Run key to start application
-
Contacts a large (521) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
2a03c4a7ac5ee5e0e0a683949f70971b
-
SHA1
3bd9877caaea4804c0400420494ad1143179dcec
-
SHA256
d4f0042d8e7622b7e14395e926dd02edab3cdc77e82d88108b67a4d2cee9229b
-
SHA512
1942cdb522859f8dba46824786e361794a62e6201279201e1e0e2e07499fb6252933c5661782fccd77291c3650cafb2a7a08eee5431c8238f0da44840ee4c476
-
SSDEEP
192:y4n3T5aK+dHCMR1aQR9RuZl3WWmU7WYZsw1JpVGnrjdK72dwF7dBOne:Tn3T5KdHCMRD/R1cOnrjd+BO
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
6f5257c0b8c0ef4d440f4f4fce85fb1b
-
SHA1
b6ac111dfb0d1fc75ad09c56bde7830232395785
-
SHA256
b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
-
SHA512
a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
SSDEEP
96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
Score3/10 -
-
-
Target
Pwgen.dll
-
Size
34KB
-
MD5
eab0c0a99549fe4fc568b20331d1db27
-
SHA1
4cc1a151bf4ef04be4c41278e42f11dd44f937c6
-
SHA256
246696d31993da811c210de7455d9158d0f4e0e3f75ef4367a1fb43c7fe27764
-
SHA512
094d6a63af23ae2ca54dfaf4ce59ae9c266c7de34e60828e4c5f636ab256be17da99061ce2965b99c4cce7a58f4f0c05ab09d38dcd0c2aba31d8b26d70ae7d55
-
SSDEEP
768:Ea60RIdq+TAzMbdNIABx9TqjE7VY0FXhFi:EaFRfwX7IABx9EKm
Score3/10 -
-
-
Target
_.js
-
Size
1KB
-
MD5
70a12429f0b20c26d121a2538099aca4
-
SHA1
e6796ed228fa4691314bc99c2754a8d76512d1a8
-
SHA256
0e86911736d8eec310a61888c9a2e954d4c95814514b4256af2802a55a1df779
-
SHA512
f225b2cb7fd132a8437dd758f79bf8a2b5d2575798412337be9f8a9afca1cea807a769aa1a07d30fc44ba0d3208ae666ca4debfbac56328a491d50e24c866f26
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1