General
-
Target
9f5707816aea4bbe395676187269a547_JaffaCakes118
-
Size
60KB
-
Sample
241126-c272qszkhz
-
MD5
9f5707816aea4bbe395676187269a547
-
SHA1
9aeedd62bd3f7c0a3501725c69b2493ac2f5ee13
-
SHA256
8f9533aeee2064abb573e4d75b89b907e57d7d2fb7b2588fee88a903c2a7f735
-
SHA512
e4a3c9566a1e6f093e698983ca5313aa5328e8fbbfd3cb59999372e2e06a8f9a7e531a5ebd3a924f228cbf5bc4d7270bbc91e877cf2b0b6f7333a497ae42a316
-
SSDEEP
768:ROo9osCdarCuqEUoJIHDp8LDwUzc80gmq3oP/oDV:ROmGuqho4yr/0O8/oh
Static task
static1
Behavioral task
behavioral1
Sample
9f5707816aea4bbe395676187269a547_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9f5707816aea4bbe395676187269a547_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9f5707816aea4bbe395676187269a547_JaffaCakes118
-
Size
60KB
-
MD5
9f5707816aea4bbe395676187269a547
-
SHA1
9aeedd62bd3f7c0a3501725c69b2493ac2f5ee13
-
SHA256
8f9533aeee2064abb573e4d75b89b907e57d7d2fb7b2588fee88a903c2a7f735
-
SHA512
e4a3c9566a1e6f093e698983ca5313aa5328e8fbbfd3cb59999372e2e06a8f9a7e531a5ebd3a924f228cbf5bc4d7270bbc91e877cf2b0b6f7333a497ae42a316
-
SSDEEP
768:ROo9osCdarCuqEUoJIHDp8LDwUzc80gmq3oP/oDV:ROmGuqho4yr/0O8/oh
-
Nitro family
-
Renames multiple (95) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-