General
-
Target
91f480971a54e41cf899c9bd0d7bb009_JaffaCakes118
-
Size
276KB
-
Sample
240603-qrqllahd67
-
MD5
91f480971a54e41cf899c9bd0d7bb009
-
SHA1
150d74e9ba69d69dac4064c8966b3f192131d872
-
SHA256
a4754955412700a50ec0778aee21e500c6a0b64a5e82c472f87af87cfc7c9de6
-
SHA512
14f50fb4445f2c5409e434f8ab3166e610485c2d2d87bfb65782b5d81860176529d6aa914ed89f30c5d70ad88e0085d78a0c9aa719507e0960349eda0b115a5f
-
SSDEEP
6144:ML+ROMHXZ99JX2WngMNSYZh1r0CLf2dWsLf2EUOH9:MQ7J9PgMN7LsqEUO
Static task
static1
Behavioral task
behavioral1
Sample
91f480971a54e41cf899c9bd0d7bb009_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
91f480971a54e41cf899c9bd0d7bb009_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fyndr.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/34556B9214AD24BB
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/34556B9214AD24BB
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/34556B9214AD24BB
http://xlowfznrg4wf7dli.ONION/34556B9214AD24BB
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+wtgno.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/17EF79EC845082
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/17EF79EC845082
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/17EF79EC845082
http://xlowfznrg4wf7dli.ONION/17EF79EC845082
Targets
-
-
Target
91f480971a54e41cf899c9bd0d7bb009_JaffaCakes118
-
Size
276KB
-
MD5
91f480971a54e41cf899c9bd0d7bb009
-
SHA1
150d74e9ba69d69dac4064c8966b3f192131d872
-
SHA256
a4754955412700a50ec0778aee21e500c6a0b64a5e82c472f87af87cfc7c9de6
-
SHA512
14f50fb4445f2c5409e434f8ab3166e610485c2d2d87bfb65782b5d81860176529d6aa914ed89f30c5d70ad88e0085d78a0c9aa719507e0960349eda0b115a5f
-
SSDEEP
6144:ML+ROMHXZ99JX2WngMNSYZh1r0CLf2dWsLf2EUOH9:MQ7J9PgMN7LsqEUO
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (408) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-