General
-
Target
87b1a87121d9cff070e9f2a004df78c2_JaffaCakes118
-
Size
1.4MB
-
Sample
240531-vedhqaee6x
-
MD5
87b1a87121d9cff070e9f2a004df78c2
-
SHA1
7d0c750e3d85c1d1a46301042432a5568e59b8ee
-
SHA256
668f4d750f26504348477e32cb73aff0cd68d8a0997619f2d1402338d3011f03
-
SHA512
6c65c06d9d814bda71e89d2c0f7f581f418709f7c822a59aa037609c45a98bce2223c99042bc2e6a0653746cd7896ba13508da186d288200b8f5124a758bd4aa
-
SSDEEP
24576:Kgb5evea/uZViytg5/sRkHYbR9StHT55bjAVf5gDaQ0JIsziQAJLGNgjWYzGth:Kgk5EBMsRkHYbRcpVDaryZzJSNdbh
Static task
static1
Behavioral task
behavioral1
Sample
fotos/Thumbs.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
fotos/Thumbs.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
fotos/foto1.lnk
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
fotos/foto1.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
fotos/foto2.lnk
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
fotos/Thumbs.db
-
Size
1.5MB
-
MD5
7b6b62a073d6eccd911a4c6a4712c14c
-
SHA1
7f4af629ea1a62e74ba039e5b7163a7144257448
-
SHA256
d9b75d82e6374a165ce1d4c6440292ea81d7fe29a037a7fff25478aef57bf553
-
SHA512
7bdcd151fb90b906e9ec8c230c1d8aeec3f7b9bbdf51dfbeb87441214a193ba81f84f0c58bb3cc3d8f4f8bb37c92404e9e7ab6eea78aca46fe224d0d03673a36
-
SSDEEP
24576:IkWAAuqeAg2x/cBWeeDYc9uuE7Hmo0baLWdnhMDW+H56FoGqTWPeB8S+GsZNpz7:IHg2x/cc9DlQGzWLW1hMDRH5cJK8S+Jt
Score10/10-
Detected Xorist Ransomware
-
Renames multiple (2044) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
fotos/foto1.lnk
-
Size
1KB
-
MD5
dd3735c04fd4134d97f38b34b5544e3b
-
SHA1
d250a2a1b545e51c3b3dffaa90b5cb0b2f30f090
-
SHA256
23ee733b758eb9c05061cd93fe7856e7ae9cea68702b6d833ee3778419ba6b02
-
SHA512
b574e4347ac9272ed2b9a0b0f373085acc58a08500b81713385d0fe85907fbf62eb0e5741246cb9fb9c0ac5301d953f6b5e8e189faf5d85f7ea6e49545380add
Score10/10-
Detected Xorist Ransomware
-
Renames multiple (2049) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
fotos/foto2.lnk
-
Size
1KB
-
MD5
dd3735c04fd4134d97f38b34b5544e3b
-
SHA1
d250a2a1b545e51c3b3dffaa90b5cb0b2f30f090
-
SHA256
23ee733b758eb9c05061cd93fe7856e7ae9cea68702b6d833ee3778419ba6b02
-
SHA512
b574e4347ac9272ed2b9a0b0f373085acc58a08500b81713385d0fe85907fbf62eb0e5741246cb9fb9c0ac5301d953f6b5e8e189faf5d85f7ea6e49545380add
Score10/10-
Detected Xorist Ransomware
-
Renames multiple (2044) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-