General
-
Target
4df3ffbb785795de68dec97206b6a696_JaffaCakes118
-
Size
484KB
-
Sample
240517-cbt27aca6v
-
MD5
4df3ffbb785795de68dec97206b6a696
-
SHA1
e22f32f3e1371f6deeb39bbffb5fde6a08344c5f
-
SHA256
1d58c2f7b8364b1d207e39f91138b5079e6368a78312557117fcdc9f38deb87a
-
SHA512
310bda0a23f780b27937fe6065239326ca1576a3eba7fa7a1867a7d3b56da2dc29c5fcab1daa1e43a991e770a21d6cd208e21b5f551ebf219266315859c03122
-
SSDEEP
6144:YutAHuAX1/7zv+Ul4s/KFxhNDPPHf2TNhOAL68v6RD/Nqr49Jr:YxHu4/H6xhtPPHf2JhTxvU/4rI
Static task
static1
Behavioral task
behavioral1
Sample
4df3ffbb785795de68dec97206b6a696_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4df3ffbb785795de68dec97206b6a696_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+chvsa.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/A820E5B6B0213CBE
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/A820E5B6B0213CBE
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/A820E5B6B0213CBE
http://xlowfznrg4wf7dli.ONION/A820E5B6B0213CBE
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+awkna.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/3A391476EB637F65
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/3A391476EB637F65
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/3A391476EB637F65
http://xlowfznrg4wf7dli.ONION/3A391476EB637F65
Targets
-
-
Target
4df3ffbb785795de68dec97206b6a696_JaffaCakes118
-
Size
484KB
-
MD5
4df3ffbb785795de68dec97206b6a696
-
SHA1
e22f32f3e1371f6deeb39bbffb5fde6a08344c5f
-
SHA256
1d58c2f7b8364b1d207e39f91138b5079e6368a78312557117fcdc9f38deb87a
-
SHA512
310bda0a23f780b27937fe6065239326ca1576a3eba7fa7a1867a7d3b56da2dc29c5fcab1daa1e43a991e770a21d6cd208e21b5f551ebf219266315859c03122
-
SSDEEP
6144:YutAHuAX1/7zv+Ul4s/KFxhNDPPHf2TNhOAL68v6RD/Nqr49Jr:YxHu4/H6xhtPPHf2JhTxvU/4rI
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (408) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-