General
-
Target
725b613fb1b3162839c7ade694ba9d76_JaffaCakes118
-
Size
396KB
-
Sample
240525-se3rhagh95
-
MD5
725b613fb1b3162839c7ade694ba9d76
-
SHA1
f7c2b1ac86b076967a5e166153ce569992a9ca4c
-
SHA256
935a780cd6da40ea7f565208caae1957ffa1428267dc954970b78017cd46de71
-
SHA512
90b4789c4039dcfd95c6254b1c12d5a3348c7a85afef04a96967bb6d685028313a2d8f58bd142dacea547b608f7e437663200985c400201e6baeb6bb0868caa9
-
SSDEEP
12288:Zyhk4guPKtNE2E3URVPUF8K0ea20/lXJ+YwCi4dOy:MPKtNE2EklTN20a2d
Static task
static1
Behavioral task
behavioral1
Sample
725b613fb1b3162839c7ade694ba9d76_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
725b613fb1b3162839c7ade694ba9d76_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+nujer.txt
http://p57gest54celltraf743knjf.mottesapo.com/1857996B99FD11E5
http://k4restportgonst34d23r.oftpony.at/1857996B99FD11E5
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/1857996B99FD11E5
http://fwgrhsao3aoml7ej.onion/1857996B99FD11E5
http://fwgrhsao3aoml7ej.ONION/1857996B99FD11E5
Extracted
C:\PerfLogs\Recovery+loqer.txt
http://p57gest54celltraf743knjf.mottesapo.com/9A893DA8AF18EAE6
http://k4restportgonst34d23r.oftpony.at/9A893DA8AF18EAE6
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/9A893DA8AF18EAE6
http://fwgrhsao3aoml7ej.onion/9A893DA8AF18EAE6
http://fwgrhsao3aoml7ej.ONION/9A893DA8AF18EAE6
Targets
-
-
Target
725b613fb1b3162839c7ade694ba9d76_JaffaCakes118
-
Size
396KB
-
MD5
725b613fb1b3162839c7ade694ba9d76
-
SHA1
f7c2b1ac86b076967a5e166153ce569992a9ca4c
-
SHA256
935a780cd6da40ea7f565208caae1957ffa1428267dc954970b78017cd46de71
-
SHA512
90b4789c4039dcfd95c6254b1c12d5a3348c7a85afef04a96967bb6d685028313a2d8f58bd142dacea547b608f7e437663200985c400201e6baeb6bb0868caa9
-
SSDEEP
12288:Zyhk4guPKtNE2E3URVPUF8K0ea20/lXJ+YwCi4dOy:MPKtNE2EklTN20a2d
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (408) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-