General
-
Target
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118
-
Size
270KB
-
Sample
241207-dxdsrszjaq
-
MD5
d06bcb8239ac95548e5c6aa2167cdc56
-
SHA1
d3d11254999b6bede1a971a7d16af3e726a1bab9
-
SHA256
3e51ccd8f1f298ea9fdb6fdb72a34e4d963efd77d94d72563dc2c56c98eb5329
-
SHA512
e77bec59496ce7cfd33fec5b72e4fcbb2c2e8171aa51a622247476827ec644d6b3e91174ee74718200c1f5ce59481bf45db8d21f60d6c9c359e18a32f4f0de18
-
SSDEEP
6144:Kn/L+GOmtI2Fv6xDuf5sJFjSJnHY9ImCmUaXDjdx2WSJbxV1iF:0zOmtLFyxqREsn4KmRXdxNSjPiF
Static task
static1
Behavioral task
behavioral1
Sample
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ProxySettings.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ProxySettings.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\README.hta
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\README.hta
Targets
-
-
Target
d06bcb8239ac95548e5c6aa2167cdc56_JaffaCakes118
-
Size
270KB
-
MD5
d06bcb8239ac95548e5c6aa2167cdc56
-
SHA1
d3d11254999b6bede1a971a7d16af3e726a1bab9
-
SHA256
3e51ccd8f1f298ea9fdb6fdb72a34e4d963efd77d94d72563dc2c56c98eb5329
-
SHA512
e77bec59496ce7cfd33fec5b72e4fcbb2c2e8171aa51a622247476827ec644d6b3e91174ee74718200c1f5ce59481bf45db8d21f60d6c9c359e18a32f4f0de18
-
SSDEEP
6144:Kn/L+GOmtI2Fv6xDuf5sJFjSJnHY9ImCmUaXDjdx2WSJbxV1iF:0zOmtLFyxqREsn4KmRXdxNSjPiF
-
Cerber family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Contacts a large (519) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
a436db0c473a087eb61ff5c53c34ba27
-
SHA1
65ea67e424e75f5065132b539c8b2eda88aa0506
-
SHA256
75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
-
SHA512
908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
SSDEEP
192:aVL7iZJX76BisO7+UZEw+Rl59pV8ghsVJ39dx8T:d7NsOpZsfLMJ39e
Score3/10 -
-
-
Target
ProxySettings.dll
-
Size
107KB
-
MD5
9e3924ebb28ee2902e5b2e7d786cb7d6
-
SHA1
1ffad8384cb28dd4d36e1c3a9f1781d8562553d1
-
SHA256
022ddd07ca9c7ba5d95d9be3900a373d5aa279b051418a7cb083a12e2383b2e2
-
SHA512
3a908723827f068e41908549d74768af6deacf1bbc1b7b29beb433ee01ee15d0b815b6f3b9a9c165c60dd58931f1c7c6e6f38b70e5336aec7ffb0be4379e4a6e
-
SSDEEP
3072:7nRSlqQs7D9AjwTWf9c2rK+GHGVifKtN4Zba:7nR4af9AjJf9CGGKoZ
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1