General
-
Target
37f4f850cdbff63aeaa7cddc1c109a2f_JaffaCakes118
-
Size
133KB
-
Sample
240512-dqpaxsgh22
-
MD5
37f4f850cdbff63aeaa7cddc1c109a2f
-
SHA1
aff7432e46dd7208360489b200b5a3681b49c64c
-
SHA256
9c9722eb1fe7c7d35eff80252cf3b88d2e82b9cdcd52afed719da516a6fd8e57
-
SHA512
908daa1b310f9ed6f45dad2ab41cae986d041d654f71d01da1006899a3291f90145e4594b634e71f75a69735155d103c857662ebac054fec5069d9019efd1617
-
SSDEEP
3072:TMoMengMYwQn0Qcagg1jSM125THtY8zIOYRGJSr/zf1bbBJ:IoMigDF03HDzPYRGJSrJv
Static task
static1
Behavioral task
behavioral1
Sample
37f4f850cdbff63aeaa7cddc1c109a2f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37f4f850cdbff63aeaa7cddc1c109a2f_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\info.hta
http://www.w3.org/TR/html4/strict.dtd'>
https://www.wikihow.com/Create-a-Jabber-Account</div>
https://psi-im.org/download/</div>
Targets
-
-
Target
37f4f850cdbff63aeaa7cddc1c109a2f_JaffaCakes118
-
Size
133KB
-
MD5
37f4f850cdbff63aeaa7cddc1c109a2f
-
SHA1
aff7432e46dd7208360489b200b5a3681b49c64c
-
SHA256
9c9722eb1fe7c7d35eff80252cf3b88d2e82b9cdcd52afed719da516a6fd8e57
-
SHA512
908daa1b310f9ed6f45dad2ab41cae986d041d654f71d01da1006899a3291f90145e4594b634e71f75a69735155d103c857662ebac054fec5069d9019efd1617
-
SSDEEP
3072:TMoMengMYwQn0Qcagg1jSM125THtY8zIOYRGJSr/zf1bbBJ:IoMigDF03HDzPYRGJSrJv
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (304) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-