General
-
Target
05a30994821845197be5d1ebb616dbbb_JaffaCakes118
-
Size
328KB
-
Sample
240428-vbksmacb79
-
MD5
05a30994821845197be5d1ebb616dbbb
-
SHA1
0bf4c283b2ecac2d8d94074248403d89754c688f
-
SHA256
73a2ed1606f22e828554948d7f79dd99f2858bc3465e5065abcbf90d98583b3c
-
SHA512
6bcffb9ec948aee21851e299a8a96a6c795c5546fad7d2f737ceb5f6d782975551b0f77e8e6c91450d5ee881f8e8d35eceb1944101eb94656b42a1e72c1e6073
-
SSDEEP
6144:a9zyYnK/Poydbl3rFLRN8kAZyubtSiTsflsyAC9RM4ATGtMHoLm:8sgKdrBRMdSOCPbxL
Static task
static1
Behavioral task
behavioral1
Sample
05a30994821845197be5d1ebb616dbbb_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
05a30994821845197be5d1ebb616dbbb_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+ffxne.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/ACE6B632AF418E66
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/ACE6B632AF418E66
http://yyre45dbvn2nhbefbmh.begumvelic.at/ACE6B632AF418E66
http://xlowfznrg4wf7dli.ONION/ACE6B632AF418E66
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+lebif.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/40FA5AFAA23B61ED
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/40FA5AFAA23B61ED
http://yyre45dbvn2nhbefbmh.begumvelic.at/40FA5AFAA23B61ED
http://xlowfznrg4wf7dli.ONION/40FA5AFAA23B61ED
Targets
-
-
Target
05a30994821845197be5d1ebb616dbbb_JaffaCakes118
-
Size
328KB
-
MD5
05a30994821845197be5d1ebb616dbbb
-
SHA1
0bf4c283b2ecac2d8d94074248403d89754c688f
-
SHA256
73a2ed1606f22e828554948d7f79dd99f2858bc3465e5065abcbf90d98583b3c
-
SHA512
6bcffb9ec948aee21851e299a8a96a6c795c5546fad7d2f737ceb5f6d782975551b0f77e8e6c91450d5ee881f8e8d35eceb1944101eb94656b42a1e72c1e6073
-
SSDEEP
6144:a9zyYnK/Poydbl3rFLRN8kAZyubtSiTsflsyAC9RM4ATGtMHoLm:8sgKdrBRMdSOCPbxL
Score10/10-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Renames multiple (421) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-