General
-
Target
1c7ed964dddd78ee5e8d3427e39fb613_JaffaCakes118
-
Size
731KB
-
Sample
240506-pm8e6seg82
-
MD5
1c7ed964dddd78ee5e8d3427e39fb613
-
SHA1
e34a8c0d58ffe8228ccd18adcab3bd155012f7bb
-
SHA256
9f108d3210afe4fd08c411caa2cd5540c7d1501b419018c193d30eccca8b02df
-
SHA512
e2995588fd9b0a02e19f1eb9443d507b6160ae34a6e6d5b7d8749ae895eceda19cdf55c24d1b563bb8841c6dc05fdcf8a8b857f5ccfdede7ebbeeee8d8d3546b
-
SSDEEP
12288:164z/NTF6hT2H72/3DTYFC24a10Yw54xs0FzNiqosdA6F5mSZ/:gWF6hTCq3YFD4eosa6/
Static task
static1
Behavioral task
behavioral1
Sample
1c7ed964dddd78ee5e8d3427e39fb613_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c7ed964dddd78ee5e8d3427e39fb613_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
C:\ProgramData\uowhmkm.html
http://kurrmpfx6kgmsopm.onion.cab
http://kurrmpfx6kgmsopm.tor2web.org
http://kurrmpfx6kgmsopm.onion
Targets
-
-
Target
1c7ed964dddd78ee5e8d3427e39fb613_JaffaCakes118
-
Size
731KB
-
MD5
1c7ed964dddd78ee5e8d3427e39fb613
-
SHA1
e34a8c0d58ffe8228ccd18adcab3bd155012f7bb
-
SHA256
9f108d3210afe4fd08c411caa2cd5540c7d1501b419018c193d30eccca8b02df
-
SHA512
e2995588fd9b0a02e19f1eb9443d507b6160ae34a6e6d5b7d8749ae895eceda19cdf55c24d1b563bb8841c6dc05fdcf8a8b857f5ccfdede7ebbeeee8d8d3546b
-
SSDEEP
12288:164z/NTF6hT2H72/3DTYFC24a10Yw54xs0FzNiqosdA6F5mSZ/:gWF6hTCq3YFD4eosa6/
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-