General
-
Target
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118
-
Size
488KB
-
Sample
240525-sh83paha84
-
MD5
725ddfb95fd1c510ccb21871cd9836bd
-
SHA1
3beb5264a7a162896f749f572bb8a967b095c2a9
-
SHA256
24cac290ff15530f6566eb99ca8eef135bd198f1e7f481a59f3c231b0d7e3b5b
-
SHA512
69029d4dfc236f8a5392ee47da08fa1b7401a3b8b97eb688671d06aba401c4817705734c79fcc21642a52172ad02592513c127c98defed873aacdfd85050cef2
-
SSDEEP
12288:dUU7RCmpby4PIrzRxFTuqQ8qZceNsiMkyhU:d19CmCrNxFTuqQhZvi6d
Static task
static1
Behavioral task
behavioral1
Sample
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+lowlc.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/14CA74BE854E333
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/14CA74BE854E333
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/14CA74BE854E333
http://xlowfznrg4wf7dli.ONION/14CA74BE854E333
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+jcmco.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5BF6ADFE4BCEBAAA
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/5BF6ADFE4BCEBAAA
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/5BF6ADFE4BCEBAAA
http://xlowfznrg4wf7dli.ONION/5BF6ADFE4BCEBAAA
Targets
-
-
Target
725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118
-
Size
488KB
-
MD5
725ddfb95fd1c510ccb21871cd9836bd
-
SHA1
3beb5264a7a162896f749f572bb8a967b095c2a9
-
SHA256
24cac290ff15530f6566eb99ca8eef135bd198f1e7f481a59f3c231b0d7e3b5b
-
SHA512
69029d4dfc236f8a5392ee47da08fa1b7401a3b8b97eb688671d06aba401c4817705734c79fcc21642a52172ad02592513c127c98defed873aacdfd85050cef2
-
SSDEEP
12288:dUU7RCmpby4PIrzRxFTuqQ8qZceNsiMkyhU:d19CmCrNxFTuqQhZvi6d
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (408) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-