General
-
Target
a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118
-
Size
340KB
-
Sample
240614-jdhkhatgjm
-
MD5
a88a800bcbb2085db77ee1e6169330ef
-
SHA1
45737b9bbd250a604f2bc066e4f811cecbf29cfd
-
SHA256
d4c33fa5c8029230ac4dcb181ea1899855e6cb3e22d33ceb0b361d014ff98dd5
-
SHA512
cf5bea6231187f5de20e6834799f122a19467d5959b266066599e4e5a9b4641ed8602bc41bca6658cd2f478eaeffa33cff4acfdc6bbf744df387447efb70df75
-
SSDEEP
6144:V/f8fPWz3Tz5denLftACItq4JZzlZ4VnJVF+NVttoxeM4cbtn:V/fCK3TiftYNlkZ8rKeM
Static task
static1
Behavioral task
behavioral1
Sample
a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+lxcge.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EA37A1B0722770DA
http://tes543berda73i48fsdfsd.keratadze.at/EA37A1B0722770DA
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EA37A1B0722770DA
http://xlowfznrg4wf7dli.ONION/EA37A1B0722770DA
Extracted
C:\PerfLogs\_RECOVERY_+whygj.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/E6E3CFB1B620C85B
http://tes543berda73i48fsdfsd.keratadze.at/E6E3CFB1B620C85B
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E6E3CFB1B620C85B
http://xlowfznrg4wf7dli.ONION/E6E3CFB1B620C85B
Targets
-
-
Target
a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118
-
Size
340KB
-
MD5
a88a800bcbb2085db77ee1e6169330ef
-
SHA1
45737b9bbd250a604f2bc066e4f811cecbf29cfd
-
SHA256
d4c33fa5c8029230ac4dcb181ea1899855e6cb3e22d33ceb0b361d014ff98dd5
-
SHA512
cf5bea6231187f5de20e6834799f122a19467d5959b266066599e4e5a9b4641ed8602bc41bca6658cd2f478eaeffa33cff4acfdc6bbf744df387447efb70df75
-
SSDEEP
6144:V/f8fPWz3Tz5denLftACItq4JZzlZ4VnJVF+NVttoxeM4cbtn:V/fCK3TiftYNlkZ8rKeM
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (416) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-