General
-
Target
4b1f6499e4cc634ef9444adc24243cca_JaffaCakes118
-
Size
356KB
-
Sample
240516-pxaxnade97
-
MD5
4b1f6499e4cc634ef9444adc24243cca
-
SHA1
9d118446b0a5edd930ced59ce7dba5b9a66ca358
-
SHA256
10380d0df39b7a3ad85fb02bdb9b4a564ed1cf6d2cef51b2af392fc0ae56c312
-
SHA512
44d192c0309c530e05a94ec0207f8ad030fee25fe96ee773a25853c1fb9ce117138d1422ff8ebbd65a41c976927ff95eb1858f780d9da656f2a7dc33f435b48f
-
SSDEEP
6144:QmQ/rffLCxpVPEeTp+W+cMwH9rgWGBbzTXcwAcMSPsFzz7s02YrRAUZg:crfO3VPXb+cMo9MJ4SkUuRAUZg
Static task
static1
Behavioral task
behavioral1
Sample
4b1f6499e4cc634ef9444adc24243cca_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b1f6499e4cc634ef9444adc24243cca_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+nhyeo.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/2AA7FCA9DF869E9
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/2AA7FCA9DF869E9
http://yyre45dbvn2nhbefbmh.begumvelic.at/2AA7FCA9DF869E9
http://xlowfznrg4wf7dli.ONION/2AA7FCA9DF869E9
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+dolaq.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/2D23D0AE22F94939
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/2D23D0AE22F94939
http://yyre45dbvn2nhbefbmh.begumvelic.at/2D23D0AE22F94939
http://xlowfznrg4wf7dli.ONION/2D23D0AE22F94939
Targets
-
-
Target
4b1f6499e4cc634ef9444adc24243cca_JaffaCakes118
-
Size
356KB
-
MD5
4b1f6499e4cc634ef9444adc24243cca
-
SHA1
9d118446b0a5edd930ced59ce7dba5b9a66ca358
-
SHA256
10380d0df39b7a3ad85fb02bdb9b4a564ed1cf6d2cef51b2af392fc0ae56c312
-
SHA512
44d192c0309c530e05a94ec0207f8ad030fee25fe96ee773a25853c1fb9ce117138d1422ff8ebbd65a41c976927ff95eb1858f780d9da656f2a7dc33f435b48f
-
SSDEEP
6144:QmQ/rffLCxpVPEeTp+W+cMwH9rgWGBbzTXcwAcMSPsFzz7s02YrRAUZg:crfO3VPXb+cMo9MJ4SkUuRAUZg
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (420) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-