General
-
Target
7bb0002fc54b61caa965155af3fe9661_JaffaCakes118
-
Size
240KB
-
Sample
240528-e1epxaee2s
-
MD5
7bb0002fc54b61caa965155af3fe9661
-
SHA1
f4b49c4ccd0cd2fdcd2b9a82b6ee1cf3026e32a4
-
SHA256
bd8b1735069efbdd3604c8dfe1682b0685cee4746f1ec30f3003046563ba5145
-
SHA512
52b063e7eaf24574e30b0544a96e852820451189db192df05aabf376819481c282bb95ef66eb6b18348ff07da7b5989f9fe3002fca4dc1747983c0ea473d9ce0
-
SSDEEP
3072:uCumYo0fMi+UzgH2kc+403/jQbg7YZh/aBMv+WWhlP9y8YgoCXsK9QIRnVg+YFP0:CcjH2qjWcuIht9oCXD9nVgHNabl
Static task
static1
Behavioral task
behavioral1
Sample
7bb0002fc54b61caa965155af3fe9661_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7bb0002fc54b61caa965155af3fe9661_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+irgur.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/106A55BB8F31FD
http://tes543berda73i48fsdfsd.keratadze.at/106A55BB8F31FD
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/106A55BB8F31FD
http://xlowfznrg4wf7dli.ONION/106A55BB8F31FD
Targets
-
-
Target
7bb0002fc54b61caa965155af3fe9661_JaffaCakes118
-
Size
240KB
-
MD5
7bb0002fc54b61caa965155af3fe9661
-
SHA1
f4b49c4ccd0cd2fdcd2b9a82b6ee1cf3026e32a4
-
SHA256
bd8b1735069efbdd3604c8dfe1682b0685cee4746f1ec30f3003046563ba5145
-
SHA512
52b063e7eaf24574e30b0544a96e852820451189db192df05aabf376819481c282bb95ef66eb6b18348ff07da7b5989f9fe3002fca4dc1747983c0ea473d9ce0
-
SSDEEP
3072:uCumYo0fMi+UzgH2kc+403/jQbg7YZh/aBMv+WWhlP9y8YgoCXsK9QIRnVg+YFP0:CcjH2qjWcuIht9oCXD9nVgHNabl
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (416) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-