Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 01:35

General

  • Target

    a362450bd0ca83110c1509f09497f76c_JaffaCakes118.exe

  • Size

    347KB

  • MD5

    a362450bd0ca83110c1509f09497f76c

  • SHA1

    6d417bccb8e80cceac70be15040e82a0a3471b82

  • SHA256

    fb8faabbb27afe1fcae20d8d1d10896d484c42bc7bd714bf5ed4fb783945f0fa

  • SHA512

    c3cc44e6f6ba42fb97c1c7b313f1f273306c2d600e59388a8830fee4eec6c3dd1844a2a353a33157726a75ccc5b18975a7ba76c78f519adfc0f059c7f74e6c05

  • SSDEEP

    6144:Zul3JU9DhrPjzXZxOMhb2ZLWc4pPLJahf5WbQlFIJ8WDamSETrNVD2Og0z2Wov:ZulEhriMYZLWcKPVa5UO6J8Wum9TrX2h

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+pvcae.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/64DC63C0248CEA55 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/64DC63C0248CEA55 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/64DC63C0248CEA55 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/64DC63C0248CEA55 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/64DC63C0248CEA55 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/64DC63C0248CEA55 http://yyre45dbvn2nhbefbmh.begumvelic.at/64DC63C0248CEA55 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/64DC63C0248CEA55
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/64DC63C0248CEA55

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/64DC63C0248CEA55

http://yyre45dbvn2nhbefbmh.begumvelic.at/64DC63C0248CEA55

http://xlowfznrg4wf7dli.ONION/64DC63C0248CEA55

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (389) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a362450bd0ca83110c1509f09497f76c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a362450bd0ca83110c1509f09497f76c_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\lvvmahpwewsm.exe
      C:\Windows\lvvmahpwewsm.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2996
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1312
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2232
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LVVMAH~1.EXE
        3⤵
          PID:2176
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A36245~1.EXE
        2⤵
        • Deletes itself
        PID:2680
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2528
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:1884

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+pvcae.html

            Filesize

            12KB

            MD5

            780334e656e662bee13f1d747a39e604

            SHA1

            f40324bbaed15a2ec0b3cfd190d9eaf34a7741b5

            SHA256

            3aa3719d71b99aae9ff662aef3d9da73d6cc699eaabb5677ef71ea680abf493c

            SHA512

            38463089433c4ca6c7c2b7d71f6d23423a57f42c32e3e1289e0eb2323d714e8d6973bb1eea3f2bb00fa0570cc5004db92d4f240ef2a7c65b7fdaf0369cca78ed

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+pvcae.png

            Filesize

            65KB

            MD5

            787b23da7b84b92342af8367b9a656b9

            SHA1

            3e5904a0e82d09d003fdd50d398792974771ff90

            SHA256

            111242744ff8bd61e7e194cebd8ad2e8a3260212b6759df5d0bb91311ca87ee5

            SHA512

            d1f75b12faae6c0acbd88300a6662dd7edfb2cfca2f029597a0a51b8e2f6adc168473b17777fb9974c8c822d1c66b13a380a2d8cd53cfa23a9a40e7660eae86d

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+pvcae.txt

            Filesize

            1KB

            MD5

            081821d2da29263aa1db0033efa726ff

            SHA1

            c4ef78e1981961357d7055d82071f017aed0666d

            SHA256

            d29af3b492af3a2cb711ad8c59f69c3fb176cfbdbc65f45c413f7bb19e224f17

            SHA512

            f65657ece984c0b1bc526a3717d447d9f09487123e6267e24973e4b9182e60c59a2ff8559f7f790937895710dd29507a2a4ad0bbe1d49e114b3123dc3eee34ed

          • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

            Filesize

            11KB

            MD5

            8eb195721c1217e93d5291a77bfb4d97

            SHA1

            599f40b2dcd7f7faf907017fe9a8e7de2acc2c94

            SHA256

            3bd520e69f79329061e405edfc72fcd62e4a7680c58b1f64b638c7fa3d202e76

            SHA512

            181daefe2ab00fa561e9188ef9ca0825a8158f0034a18d6d946ecd2d27fcc13bc6ecf64700e8ef4663844f0811d0589870760bb9eaea141f53c6b58dfaa8bfe1

          • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

            Filesize

            109KB

            MD5

            49b0b695ecf218735d74ca4d50cdb8be

            SHA1

            001aae33172e1e3e55f04612ba1aca3a0af5db04

            SHA256

            d8dd09e02140d34eacaf4d673129eef890ec4f1f6c460d541a7f84e7f232e748

            SHA512

            1e04dbd471370dfc91422d4a754a7c89b0cd89d02ecb92393f5dd92e8b2312f8ddd618a8f491420c994f8b4aa25514f238a154f3a859dfecfbd2356c2d92e694

          • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

            Filesize

            173KB

            MD5

            1282da44fcce5703515b75ac930d5632

            SHA1

            ac34d2b8ae0c00be8daf69fba8734b55cfefc942

            SHA256

            84aa937fc53beb3a3f408a82937dddafd15a55f7b443a8595152b1b2fa7b8cdd

            SHA512

            1fe25fbc77d383bff13daf617884b402301349781f8fa97380b08c522fce72bf25922c0e0feccbe0f5d31e6072623aa544dfd26e6f607ca2d92e6d4306951246

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            ae72b3094c0b87e7cf6d75290797ca0f

            SHA1

            706aed1e2241840722cd48e422385a97db7c3474

            SHA256

            60c96cf2fabe689c9968feb0dfd9463d15bec9f3b4d6182f81905a98817dd0af

            SHA512

            bcc45f6350cc064904f013ec296ba1687b30f4fd8d7e0c25bde1638cc08bf27c2a07278aafb81ac8a295c0fc3486ad24518e6f014d2f9c4682d7e942ca852450

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            c9f0cf2b09eb99d0da4b24e5314f4807

            SHA1

            36bd97bae1c0e29510785c806382c40b01c79470

            SHA256

            773ed25ec6b06063b8a2e3f80b9e5d728d06a1636c059c28b84cb0b1d0480345

            SHA512

            6e92fb81c0b895a6a6f93443f0666f574778e6f8af6c192e9f705ca72b925b1ba7d0b2129ef208f8663ae7b6cf101b8fe815564e6e62dbb906c049362a7b29b5

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            0f216ba3359c47cba1b169ca7a001852

            SHA1

            8ed04a0afd5cccc82da9caf4e026e6452a5fe480

            SHA256

            6adf85c41862a0544f7e8c2d3bd73c9b354abb066f3f642173e67abc0049fe60

            SHA512

            2dee7970295d9768351751466c0c495eeefb55ec5d38c4caa78c62c0f21af0c96c676670d82831a29f57bfb25b781ebe9fbc8dd32778bb4e35e2441d210ec26f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3a002b4558a00cad87edb19d95d6e1ef

            SHA1

            3499bc09a4bfcc637f6f37cc852c7684b8e31c38

            SHA256

            d0183ebda3a01d03f89818ccd768049f5ddef0ad281d6f962e25f8926922b120

            SHA512

            70f17d85bca2ba4d1ad2eaf086a3237ecafd514936f2c42324b5a4d693d96bf98d807762f24e2a3c56adc34aca0b3d595cbfe768e1497ee094284a9f2ae15b2d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            6dc08b2234436908b23dfc59ac1faf62

            SHA1

            725f5105d4a3c954fbbcfab2d8091f3584b1034d

            SHA256

            1af4515d38620451d2ee8ecd7bc915c1a7112f5646eedc45e5c1650e7ae55b95

            SHA512

            c03b4d99f0d69664344062dd42190e6a4980a6496d2f3de7fc055f9b82fe2740003bb00a9caa056b60ada00e2e40d8ad1f39bd07bb8a96d1c4171adb0231a506

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            bb5f482517d58bfd318400a89bd29266

            SHA1

            285aa37777a8597efb0be3a7e4522e9ef06dc12c

            SHA256

            1994ed409995f600561a2fc5afdfcc7974d6d60c770c384f085ba4c92be89d63

            SHA512

            a807baff8486f97faa56a22cab1def7defd868fbefb869d360408e23aa7372a18cabd5104e7a97c2d56fbebd03d9fbe6b4f97c7e612314784932cbbbb337cc2f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            a6afb53ab6cee21bfa23fa14c369b975

            SHA1

            ebdc5846c949aac589049dbc8ec99a0a542f2703

            SHA256

            22fe180ce37e7e983bed602f51cc107e28a7d8112d90dc5b68dcfab5f2dad232

            SHA512

            25f5e50111b20878d7ee51176c386083f456f28859d27648f9e3dda54c545a82230d9878fcb27e24f4c02a3337b7fc2adbd86445c1ef02ff6426de3c22c01887

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            bd1cc0d110504f5c98f48b5423a72068

            SHA1

            f01b08723545a52beda2d9a4ed920f1d766d5548

            SHA256

            87850383471dd40c990028dabc236484c31df967241a4065cbd984bbce05ef78

            SHA512

            3c4a9f1b648a019237931646122cf6e11d60ec78a79f944ed1f611b8f05acfb50696992253e9292231aa75e90170fc9f3f4b612551efe002737d55d527a13786

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            0b8da555c8e9bde5b899dd61843c96f1

            SHA1

            27755fe016e41629f636949fa654ccda065591d8

            SHA256

            d4937946f3c9951f45807b807df60f40e169a45cba0780ce4bab8482f7437564

            SHA512

            dbccd456d69cebb74bea7486df5a9b9dcfec789d0c8c96c9ec469133268f6e2943ceba089c57c52b202d04ee0ef8be50e1921255ef0c11670951f4813ff56928

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            c97b5e13a46ca1ee4c6d7349b38b116b

            SHA1

            9b67b7b4eca1fa34a62c1b315385751e6e506b36

            SHA256

            090b55458354d012db751dc337c9ee543324fb28b80c31cf6e11a989df0aaa49

            SHA512

            96d3833c51a7a1caf384c4604dc7ac0f5d9c883ef957c9c53f07def8c8e01eb172bd5f60af2969d17ef6201f541387e00906b93081a5e725521b0095c958a9b5

          • C:\Users\Admin\AppData\Local\Temp\CabDA4B.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\TarDAFA.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Windows\lvvmahpwewsm.exe

            Filesize

            347KB

            MD5

            a362450bd0ca83110c1509f09497f76c

            SHA1

            6d417bccb8e80cceac70be15040e82a0a3471b82

            SHA256

            fb8faabbb27afe1fcae20d8d1d10896d484c42bc7bd714bf5ed4fb783945f0fa

            SHA512

            c3cc44e6f6ba42fb97c1c7b313f1f273306c2d600e59388a8830fee4eec6c3dd1844a2a353a33157726a75ccc5b18975a7ba76c78f519adfc0f059c7f74e6c05

          • memory/1884-5877-0x00000000000F0000-0x00000000000F2000-memory.dmp

            Filesize

            8KB

          • memory/2204-1-0x00000000001F0000-0x00000000001F1000-memory.dmp

            Filesize

            4KB

          • memory/2204-0-0x00000000003C0000-0x00000000003EF000-memory.dmp

            Filesize

            188KB

          • memory/2204-2-0x0000000000400000-0x0000000000485000-memory.dmp

            Filesize

            532KB

          • memory/2204-12-0x0000000000400000-0x0000000000485000-memory.dmp

            Filesize

            532KB

          • memory/2204-11-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-723-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-1348-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-5881-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-1997-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-601-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-5876-0x0000000002BA0000-0x0000000002BA2000-memory.dmp

            Filesize

            8KB

          • memory/2996-5846-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-9-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-10-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-8-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-4894-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-4115-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB

          • memory/2996-3216-0x0000000000400000-0x00000000004AD000-memory.dmp

            Filesize

            692KB