General
-
Target
9d84da3b539d6a860f8dc5216ced6d01_JaffaCakes118
-
Size
210KB
-
Sample
241125-yefvmazjdk
-
MD5
9d84da3b539d6a860f8dc5216ced6d01
-
SHA1
8974711763fd494b8bc99794b8a5e53bba4ae60b
-
SHA256
7e40e603926f665e241174a5f137e67904d0608c507d0d7c4c4bd75af15b1722
-
SHA512
90ae87ac15e3fabf75403edb3a5ff2c46531808e5850487bfdedb7f7acf4b39dfe82fd65cc3c9edd19376cd6596798e1f0648839287557a6a30e3a282c82c0bf
-
SSDEEP
6144:8Q4/pSlUWbFDWZMvazhJWPITR4bWLgpmZ:rGk1WZG2GjHpM
Static task
static1
Behavioral task
behavioral1
Sample
9d84da3b539d6a860f8dc5216ced6d01_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d84da3b539d6a860f8dc5216ced6d01_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lemurs.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
lemurs.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Music\_README_.hta
Extracted
C:\Users\Admin\Pictures\_README_.hta
Targets
-
-
Target
9d84da3b539d6a860f8dc5216ced6d01_JaffaCakes118
-
Size
210KB
-
MD5
9d84da3b539d6a860f8dc5216ced6d01
-
SHA1
8974711763fd494b8bc99794b8a5e53bba4ae60b
-
SHA256
7e40e603926f665e241174a5f137e67904d0608c507d0d7c4c4bd75af15b1722
-
SHA512
90ae87ac15e3fabf75403edb3a5ff2c46531808e5850487bfdedb7f7acf4b39dfe82fd65cc3c9edd19376cd6596798e1f0648839287557a6a30e3a282c82c0bf
-
SSDEEP
6144:8Q4/pSlUWbFDWZMvazhJWPITR4bWLgpmZ:rGk1WZG2GjHpM
-
Cerber family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (520) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a436db0c473a087eb61ff5c53c34ba27
-
SHA1
65ea67e424e75f5065132b539c8b2eda88aa0506
-
SHA256
75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
-
SHA512
908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
SSDEEP
192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e
Score3/10 -
-
-
Target
lemurs.dll
-
Size
20KB
-
MD5
349ff55e70ed9a44611e9585aea44481
-
SHA1
65ef1354579103c4e87c2ffca5270e36e5d6bf2c
-
SHA256
27d8323ca50e040da96f71b273b7482026d65bf5ac83bacf817b432f7c3a7279
-
SHA512
54bd9e9b67cae56040376d2eb1fde9e58b31d6da3efe360b14cfc5069d5728d3777c41eb3f389db928b31cb0a6fd9f2e3bbb25cd41891754d8bec350cadf8d57
-
SSDEEP
384:b0S8J+CWb2Y2l6/5ClfxB8RkJCzqTAO0r8ifHO2v/uMjzFnmPlLmoxuTHNt:b0S8J+Zb2Y2l6/5ClfxB8RkJCgAO0r82
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1