Overview
overview
10Static
static
3d95c6471b6...18.exe
windows7-x64
10d95c6471b6...18.exe
windows10-2004-x64
7$PLUGINSDIR/docks.dll
windows7-x64
3$PLUGINSDIR/docks.dll
windows10-2004-x64
3ns.html
windows7-x64
3ns.html
windows10-2004-x64
3stub.js
windows7-x64
3stub.js
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7General
-
Target
d95c6471b6a983d7148ad287b9e31d3a_JaffaCakes118
-
Size
260KB
-
Sample
241209-nfd3bazqcm
-
MD5
d95c6471b6a983d7148ad287b9e31d3a
-
SHA1
7979403d5d9f1aadd59351ff920059d290835e44
-
SHA256
23f3b7ddd381070a349bd0c04aacce9f916e3030757d57c6791f2f6982872fa9
-
SHA512
b009cccbd1de6421989f18bdd99c463551cb8d588a5e0e861f3b253e33d057fb64466fe05a242a56db0efa5b4a3ce3e3bce3a609e0c07f13cef8c7d7068a6a3e
-
SSDEEP
6144:IpkXGhugKnyzzo8unbhSrVJauiMvbAki9YTneE8isW3rTYjEQq:931yvEb2VJaujA9Yrt3YYQq
Static task
static1
Behavioral task
behavioral1
Sample
d95c6471b6a983d7148ad287b9e31d3a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d95c6471b6a983d7148ad287b9e31d3a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/docks.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/docks.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ns.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ns.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
stub.js
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
stub.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
uninst.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
uninst.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\_README_EHIPY6_.hta
Targets
-
-
Target
d95c6471b6a983d7148ad287b9e31d3a_JaffaCakes118
-
Size
260KB
-
MD5
d95c6471b6a983d7148ad287b9e31d3a
-
SHA1
7979403d5d9f1aadd59351ff920059d290835e44
-
SHA256
23f3b7ddd381070a349bd0c04aacce9f916e3030757d57c6791f2f6982872fa9
-
SHA512
b009cccbd1de6421989f18bdd99c463551cb8d588a5e0e861f3b253e33d057fb64466fe05a242a56db0efa5b4a3ce3e3bce3a609e0c07f13cef8c7d7068a6a3e
-
SSDEEP
6144:IpkXGhugKnyzzo8unbhSrVJauiMvbAki9YTneE8isW3rTYjEQq:931yvEb2VJaujA9Yrt3YYQq
Score10/10-
Cerber family
-
Blocklisted process makes network request
-
Contacts a large (586) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/docks.dll
-
Size
11KB
-
MD5
a4dd044bcd94e9b3370ccf095b31f896
-
SHA1
17c78201323ab2095bc53184aa8267c9187d5173
-
SHA256
2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc
-
SHA512
87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a
-
SSDEEP
192:em24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlESl:m8QIl975eXqlWBrz7YLOlE
Score3/10 -
-
-
Target
ns.html
-
Size
240B
-
MD5
178a6faf504190bd781107f1b20da7df
-
SHA1
edb913befc77fcc10ffabfd50f07d2f0e28799c2
-
SHA256
967a4b484dfd1aaf4d771f7c0912d272ef8c1c59cb20e4b3b3a5e3931f495c49
-
SHA512
b4d13997220edb4501747c772eb780f52cbea3dd31940904979a52c8a63f9224f351c0ee3983525ba9fe83d60384e449e0f93cc74dacb210671a72d334a77908
Score3/10 -
-
-
Target
stub.js
-
Size
1KB
-
MD5
ccd2f285b62cb74170797be357b5669f
-
SHA1
68e668f6b43b9a87b87017a5a8db45671d550490
-
SHA256
5830f6b53e1ea91abd5de97ef219269702f413575cfe0dd6149712d68d7d61eb
-
SHA512
583069c4e0bcc29daef3d246e3b86474c84ebfead84b62cbb86963ee73748ad33d610309c2aae7769b165c9003f965316fc8c27581fa23bfbfce6b29f7a5e408
Score3/10 -
-
-
Target
uninst.exe
-
Size
61KB
-
MD5
647642f37e6d7f90cbe981c0fe844d45
-
SHA1
2f131081cde2d4ab86c70239bd7631419e6bcf35
-
SHA256
aada3d8818500a5ff36daf2e1ab96fd9da92986ed34e694795942d6e617e1eb2
-
SHA512
ccce0748bc731d527d62f981ac718eb81ac4a3e789d1bc7e5a9c8227a3b2fdfe756964381c4f5ed0749b4f25f141ea8cdbe0a129cd88b2c7e0e4163b51034fdf
-
SSDEEP
1536:DTdm9B9lYypfMXvugHQ0DbLiNuPYRN6QcI0m27:D4lLpkXGED3iNuPqDU
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1