Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:03

General

  • Target

    6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    6bcc066e2a81f34c7e052895001f44c6

  • SHA1

    6f892ec0287ace1c4c7c86e3945b44de6c9d3ba8

  • SHA256

    39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc

  • SHA512

    b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c

  • SSDEEP

    6144:2//b5dx5w2hahQGvPmZ8n0SylbvO+MeTHLlj9HhRbr3ET4b7ODRJT0luqig:SddvwdhHvPmZiyIXgLl3ZoMq4wO

Malware Config

Extracted

Path

C:\PerfLogs\Recovery+nqtin.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/CC3754BDC8FDF6C 2. http://tes543berda73i48fsdfsd.keratadze.at/CC3754BDC8FDF6C 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/CC3754BDC8FDF6C If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/CC3754BDC8FDF6C 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/CC3754BDC8FDF6C http://tes543berda73i48fsdfsd.keratadze.at/CC3754BDC8FDF6C http://tt54rfdjhb34rfbnknaerg.milerteddy.com/CC3754BDC8FDF6C *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/CC3754BDC8FDF6C
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/CC3754BDC8FDF6C

http://tes543berda73i48fsdfsd.keratadze.at/CC3754BDC8FDF6C

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/CC3754BDC8FDF6C

http://xlowfznrg4wf7dli.ONION/CC3754BDC8FDF6C

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (610) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Windows\ybywdbavirud.exe
        C:\Windows\ybywdbavirud.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3080
        • C:\Windows\ybywdbavirud.exe
          C:\Windows\ybywdbavirud.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3708
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4992
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\6BCC06~1.EXE
        3⤵
          PID:3752
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:3700
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:224

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PerfLogs\Recovery+nqtin.html

        Filesize

        11KB

        MD5

        de7c0a10174283b7ac3d82d9daf97e6e

        SHA1

        2f2306d91f9c8fb2030957bf33b1aa5f687a78b7

        SHA256

        5879791ff87d3a91a5e14216be34a73b0c449e9ff4cf0e6cdcb9687d9718f36f

        SHA512

        f06c2e1941cd2b4036edfac1cbea91272a25d766faedd7a7a1de455606408b2279be202ebebad2edd459e5fb7354924842f8d051f83e280458d964ee0a822f3f

      • C:\PerfLogs\Recovery+nqtin.png

        Filesize

        62KB

        MD5

        3f6947fd199ac733977a2451e2e9bea0

        SHA1

        b1a00e55a99ad2c7069d8ccbf2fb047f8d1cf765

        SHA256

        2702fb2f81114229af8aeb4c5c90a239c520db3d23b5a3a3d904946d07b728d5

        SHA512

        ecbeb7fcec7fffc47508c05d5a6e2a73f96ecb9636d82ea85bd4598ce0ef1cb399bb162517b923f7b6ee1491a9041570ff5ac89e0aac1777eccd3168df1baa1c

      • C:\PerfLogs\Recovery+nqtin.txt

        Filesize

        1KB

        MD5

        58dd3f32860f928a81d4b82324864797

        SHA1

        c16ac792b98afd30af4ff662944abd60b20ac49e

        SHA256

        199959e5cb929e146532cc754444917d92e7d8dd474fc59fd3c01973557a92ca

        SHA512

        cff87e015d64cf6732749f2b736ec2c09511f9a31db7fe6416c8d676f1f5fa59a55b1c1a13b8d018d8a769a152b7d10c55abfc6efaae22048615d8565bc978fd

      • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

        Filesize

        560B

        MD5

        f53ac79b59e942c04b675f52e9fca38a

        SHA1

        3519fdb0b94c3e1989529b7e386c87fac9abe50f

        SHA256

        f09299916546af5bba0038c6eb0df48a8220aeaa1bbcb2c48a4cd02da265ff60

        SHA512

        71be915cb440c4463390aa4c95cebd8e58edd2f121eaa80955325c90d63915fefb0621570a766eb863da31426613bbc8ff4f8c4c1452b6f8a8e059dd27fdf5f7

      • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

        Filesize

        560B

        MD5

        560fae1a04d7291b0a6408d07776acb1

        SHA1

        dd6f6fb38e562a1bf36958f6f5079e5cace81233

        SHA256

        90672c293f0a5fe834e67c7f2c883d0abeb132d176da5930cf507e6c39ba7371

        SHA512

        5de9fd43437458c6add37f7a6177744c7395c9e24659b3164d070259d9172c574f280dd219679db28772a4416f7f8571fb8494c8644276533bdac848d9ec25fc

      • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

        Filesize

        416B

        MD5

        80daba37bcfe124b8ef4815926dac82e

        SHA1

        70dc70ecc6ddfbb97314558861b4827d4bf7a072

        SHA256

        eb7b4877117262cc68ddc46fb3135d81b58a3d5ff6a6284ee660d92c8b8d8d2e

        SHA512

        d2db505b519f8db77474104a54b4fc02ecafb5968d6cf1bc0f6064f69c7f7fa23b810ab1b7c1b1c25b29bca6f98426808f1ca28a31047a0d60f565477af11333

      • C:\Windows\ybywdbavirud.exe

        Filesize

        340KB

        MD5

        6bcc066e2a81f34c7e052895001f44c6

        SHA1

        6f892ec0287ace1c4c7c86e3945b44de6c9d3ba8

        SHA256

        39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc

        SHA512

        b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c

      • memory/3080-11-0x0000000000400000-0x0000000000578000-memory.dmp

        Filesize

        1.5MB

      • memory/3672-12-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3672-5-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3672-4-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3672-2-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3672-1-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-24-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-612-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-22-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-19-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-18-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-501-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-525-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-3786-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-720-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-17-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-16-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-2928-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-1176-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3708-1676-0x0000000000400000-0x0000000000485000-memory.dmp

        Filesize

        532KB

      • memory/3968-3-0x00000000022E0000-0x00000000022E3000-memory.dmp

        Filesize

        12KB

      • memory/3968-0-0x00000000022E0000-0x00000000022E3000-memory.dmp

        Filesize

        12KB