Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 15:28

General

  • Target

    67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe

  • Size

    265KB

  • MD5

    67ba173a7bdf01c3016cdd70f40f45b5

  • SHA1

    23f7cb130a178507fd0437db28cfd2425c4caa2e

  • SHA256

    db0e80189ecad474b3bb4539a9d0e3dd9e14057871ca9b8ece51400a72ebb84f

  • SHA512

    fd9a2449febf26d44e3b3149ec1ca41d3c2a53e20a1d805e185f0461caf1349000ed88c7d2a800de372b54cc7692d2e695b90659a6fdf04dc6c97a0249af8cdf

  • SSDEEP

    6144:BaHY0DNpINAEQksZu+JKrzvAPXrt8QmodL:BaHY0DNpINABZ9JKrTkOox

Malware Config

Extracted

Path

C:\Users\Public\Videos\Restore-My-Files.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://decrmbgpvh6kvmti.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 1 file for free decryption. ------------------------------------------------------------ alternate address - http://helpinfh6vj47ift.onion/ DO NOT CHANGE DATA BELOW ###s6dlsnhtjwbhr###�����������07 A1 E4 F2 9D D5 1C 2D 71 55 57 01 5C ED D3 72 D3 EC 64 C2 12 89 7A 38 95 70 3F C9 E6 0F A2 03 B2 F1 D5 31 44 3A 3C AA 5A BF B7 FB 7B 13 0F 5C 1D D1 86 0F 60 B2 68 0E FF 3C BC E9 FB F1 23 18 1E 70 3B FB 1A 1C B8 D3 C2 CA 33 EE 8F 84 47 DB 12 5E 5D 71 87 68 DC A0 3B 46 4F 36 FF 6D 1B B4 9B 69 10 11 32 48 75 54 68 D7 61 1D BA 34 86 EF 45 BD C5 3C 7C 11 F8 01 94 04 5B 9C 55 1A 66 F6 70 73 CF FB 26 8C B6 E3 81 21 7F C3 C8 07 22 C3 F2 26 68 E6 42 7F 26 12 56 65 40 20 CC DB B4 C8 73 FF 74 0F 0D 40 58 87 92 A1 4F 1F CE 4C 16 68 BF AA 0B 9A D7 68 AC 7A E9 AD 1A 71 46 AE 45 27 37 E2 5F 70 2D 50 02 B1 F0 66 BC 78 F5 3E 6A 59 AE 69 C3 DE AA CD 77 2B B0 30 F4 38 6C 8F 5E 1D 59 66 3E D8 7C FB C4 4C F1 8F 43 FA E0 FB CF C1 0D 85 2B 9F 05 6E 43 C0 7A 2A 7C D4 19 8A 77 1A ###�������������
URLs

http://decrmbgpvh6kvmti.onion/

http://helpinfh6vj47ift.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Renames multiple (6905) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 29 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:1608
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe:Zone.Identifier"
      2⤵
      • NTFS ADS
      PID:2748
    • C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      PID:2160
    • C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • NTFS ADS
      PID:3496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\67ba173a7bdf01c3016cdd70f40f45b5_JaffaCakes118.exe

    Filesize

    265KB

    MD5

    67ba173a7bdf01c3016cdd70f40f45b5

    SHA1

    23f7cb130a178507fd0437db28cfd2425c4caa2e

    SHA256

    db0e80189ecad474b3bb4539a9d0e3dd9e14057871ca9b8ece51400a72ebb84f

    SHA512

    fd9a2449febf26d44e3b3149ec1ca41d3c2a53e20a1d805e185f0461caf1349000ed88c7d2a800de372b54cc7692d2e695b90659a6fdf04dc6c97a0249af8cdf

  • C:\Users\Public\Videos\Restore-My-Files.txt

    Filesize

    1KB

    MD5

    bb1499637e12628ed935340c4e4b47c4

    SHA1

    74fb497e29449e015b6f69ce31c6a1ba2658d2b3

    SHA256

    83a7b44d687ba40edd84dfcb5337ccc1993b46bb55ba68307293c6d8d5abcb7f

    SHA512

    8d937cc29c1a2e4cd58b59c3c07ead97107f54a216845d303ae2418b590ec6e5c8a2cf4904479053bfee24647a0cb5c0e0e79eaa3a13908f5da99e0a5627c3b6

  • memory/1808-5-0x0000000005940000-0x0000000005B02000-memory.dmp

    Filesize

    1.8MB

  • memory/1808-11-0x00000000744AE000-0x00000000744AF000-memory.dmp

    Filesize

    4KB

  • memory/1808-4-0x00000000744A0000-0x0000000074C50000-memory.dmp

    Filesize

    7.7MB

  • memory/1808-0-0x00000000744AE000-0x00000000744AF000-memory.dmp

    Filesize

    4KB

  • memory/1808-6-0x0000000005760000-0x0000000005768000-memory.dmp

    Filesize

    32KB

  • memory/1808-7-0x00000000057B0000-0x00000000057D2000-memory.dmp

    Filesize

    136KB

  • memory/1808-8-0x00000000060C0000-0x0000000006664000-memory.dmp

    Filesize

    5.6MB

  • memory/1808-9-0x0000000005750000-0x000000000575C000-memory.dmp

    Filesize

    48KB

  • memory/1808-10-0x0000000005B10000-0x0000000005BA2000-memory.dmp

    Filesize

    584KB

  • memory/1808-3-0x0000000004E40000-0x0000000004EA6000-memory.dmp

    Filesize

    408KB

  • memory/1808-12-0x00000000744A0000-0x0000000074C50000-memory.dmp

    Filesize

    7.7MB

  • memory/1808-13-0x0000000000840000-0x000000000084C000-memory.dmp

    Filesize

    48KB

  • memory/1808-14-0x0000000000BA0000-0x0000000000C3C000-memory.dmp

    Filesize

    624KB

  • memory/1808-2-0x0000000002810000-0x000000000283A000-memory.dmp

    Filesize

    168KB

  • memory/1808-1-0x0000000000420000-0x0000000000464000-memory.dmp

    Filesize

    272KB

  • memory/1808-27-0x00000000744A0000-0x0000000074C50000-memory.dmp

    Filesize

    7.7MB

  • memory/3496-20-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3496-19-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3496-25-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3496-16-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB