General
-
Target
3722b18641aa6ede7dc102364b583f2e_JaffaCakes118
-
Size
375KB
-
Sample
240511-3lnahaec3x
-
MD5
3722b18641aa6ede7dc102364b583f2e
-
SHA1
3edcff06d8091b9dd4b3a9543f05d3158c29e97a
-
SHA256
55912e6cc4a71d5c51b0eba1e63473f9c5653cfbca176d8cdb22165417a0f2d6
-
SHA512
d171c394ecb45cb3ef61bc89381cb8ea2f99c006f65c2f7fb0146fea8be82e52daa15dd84e14d196948400b024bd970a837ed3a5c2dcb47165792cade7e7d31d
-
SSDEEP
6144:2npfnTfCEkXi0AOddyd1NTGRsPs9vAYY53Su29t7jnTIVcPp/jaL:+5LC1Xi09RRJjQCu2L7jTIah4
Static task
static1
Behavioral task
behavioral1
Sample
3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3722b18641aa6ede7dc102364b583f2e_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+wka.txt
http://gfhshhf.home7dfg4.com/3CBB1F8BF46677CB
http://td63hftt.buwve5ton2.com/3CBB1F8BF46677CB
https://tw7kaqthui5ojcez.onion.to/3CBB1F8BF46677CB
http://tw7kaqthui5ojcez.onion/3CBB1F8BF46677CB
Targets
-
-
Target
3722b18641aa6ede7dc102364b583f2e_JaffaCakes118
-
Size
375KB
-
MD5
3722b18641aa6ede7dc102364b583f2e
-
SHA1
3edcff06d8091b9dd4b3a9543f05d3158c29e97a
-
SHA256
55912e6cc4a71d5c51b0eba1e63473f9c5653cfbca176d8cdb22165417a0f2d6
-
SHA512
d171c394ecb45cb3ef61bc89381cb8ea2f99c006f65c2f7fb0146fea8be82e52daa15dd84e14d196948400b024bd970a837ed3a5c2dcb47165792cade7e7d31d
-
SSDEEP
6144:2npfnTfCEkXi0AOddyd1NTGRsPs9vAYY53Su29t7jnTIVcPp/jaL:+5LC1Xi09RRJjQCu2L7jTIah4
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (375) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-