Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 07:33

General

  • Target

    a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    a88a800bcbb2085db77ee1e6169330ef

  • SHA1

    45737b9bbd250a604f2bc066e4f811cecbf29cfd

  • SHA256

    d4c33fa5c8029230ac4dcb181ea1899855e6cb3e22d33ceb0b361d014ff98dd5

  • SHA512

    cf5bea6231187f5de20e6834799f122a19467d5959b266066599e4e5a9b4641ed8602bc41bca6658cd2f478eaeffa33cff4acfdc6bbf744df387447efb70df75

  • SSDEEP

    6144:V/f8fPWz3Tz5denLftACItq4JZzlZ4VnJVF+NVttoxeM4cbtn:V/fCK3TiftYNlkZ8rKeM

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+lxcge.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EA37A1B0722770DA 2. http://tes543berda73i48fsdfsd.keratadze.at/EA37A1B0722770DA 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EA37A1B0722770DA If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/EA37A1B0722770DA 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EA37A1B0722770DA http://tes543berda73i48fsdfsd.keratadze.at/EA37A1B0722770DA http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EA37A1B0722770DA *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/EA37A1B0722770DA
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EA37A1B0722770DA

http://tes543berda73i48fsdfsd.keratadze.at/EA37A1B0722770DA

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EA37A1B0722770DA

http://xlowfznrg4wf7dli.ONION/EA37A1B0722770DA

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (416) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a88a800bcbb2085db77ee1e6169330ef_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\xswjohhjefsj.exe
        C:\Windows\xswjohhjefsj.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\xswjohhjefsj.exe
          C:\Windows\xswjohhjefsj.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1860
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1532
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:1552
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1752
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1752 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1920
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1800
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A88A80~1.EXE
        3⤵
        • Deletes itself
        PID:2564
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2196
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+lxcge.html

    Filesize

    11KB

    MD5

    9fe5e07de55c154fdaa98a09fd52e252

    SHA1

    f4346bba8308a36dface341fd8bb94c7e81ef44b

    SHA256

    26554b627b0b52431fc49b3b9478e4e1d9897512e40f0d2e918a65695af0f3c4

    SHA512

    2af3e3e76920c3506836f01630a9fb72afc7dfacd6d0d7eb047fa33ea89aef8ad1d8a58fb5bd194777b03ad379c7a393ca036c95efed8eedee60376b53632d4a

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+lxcge.png

    Filesize

    62KB

    MD5

    38f0abe7ffe016755780e3875cde2796

    SHA1

    aff5e4fe60c075806760fc6c70e448e05baf7c63

    SHA256

    53263d84a8d1b1d39d4e9081ce4267c62d1f155e9a14bdd44459b28d391a4639

    SHA512

    5e634901ae2de36946c7d8c43c1b47e3dac2bc77a798281638c510e3e645f6fe2beaded123d7b444118d034ecef79ddb83b180bb120671f986a36e0057745cec

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECOVERY_+lxcge.txt

    Filesize

    1KB

    MD5

    29f76abbacaa727c36925c880d55d75d

    SHA1

    254b3b2fabdaf91a8521145e93aca4ed53646396

    SHA256

    08ff06b40719fc40752f94be75997508cf6d7f61a856ef6e8c740a5610d87def

    SHA512

    15e6fa8e0e017fb827dc10ffa1e44b673586ad1a71385f1d544b883834b9840417d2de5b77073f5cd98a413d65d987ba0128695db9cc30be457686e1523faecd

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    1b11c43595cae8d4b7e30c5a450f3911

    SHA1

    bc14f19428a12da19d25d20021efd6de7c83f177

    SHA256

    dbf22ffec0f672d9a6e5201aaf84fbfdfe9a37f98d0d7ab2ca0ccbd25776941e

    SHA512

    ab56534bba7b8c0c6bf344cd2cb74ab585381a82cf0917561014e9f957af671689ea7315a569f4d8c27a9f8fc1bf283dc7d5c86f570299306f4dd4e7ceb6eb8d

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    109KB

    MD5

    9e11c26a998c19babea97e1fd03d1b85

    SHA1

    dc8a9c38b6fbcdd88fcd09d05ee6a0d87f5d6300

    SHA256

    b11dc04871d5d92872c57e8d80d10119e0a52335a41c952c0fc2d3cdc641d1ec

    SHA512

    683098d922fc862a0e0edc943c587187b23080aa7663f565e7d553f889c56151ddd879fdd5607f850eb1951edfd365b3313fbe7a8a7cb62c997983918ada887f

  • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

    Filesize

    173KB

    MD5

    437cd8de1642aba965abed830a940e4b

    SHA1

    14d4866e81304ee07410ad3f1f81424baed109f1

    SHA256

    b97c3b9949578215d9efbe118c238824fc2462542eab2f228dc1ff645465aad3

    SHA512

    b6f24fabf4dbc0d762eefd8e49923afb06cf7e15c1311e16101da04f530b16eb94e29bb7cb891cef440ea1df3e6491915aea2cd0ec9b566ea93689e5c6404512

  • C:\Windows\xswjohhjefsj.exe

    Filesize

    340KB

    MD5

    a88a800bcbb2085db77ee1e6169330ef

    SHA1

    45737b9bbd250a604f2bc066e4f811cecbf29cfd

    SHA256

    d4c33fa5c8029230ac4dcb181ea1899855e6cb3e22d33ceb0b361d014ff98dd5

    SHA512

    cf5bea6231187f5de20e6834799f122a19467d5959b266066599e4e5a9b4641ed8602bc41bca6658cd2f478eaeffa33cff4acfdc6bbf744df387447efb70df75

  • memory/1644-15-0x0000000000360000-0x0000000000363000-memory.dmp

    Filesize

    12KB

  • memory/1644-0-0x0000000000360000-0x0000000000363000-memory.dmp

    Filesize

    12KB

  • memory/1860-47-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-2443-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-6081-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-6079-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-6080-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-46-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-45-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-6055-0x00000000043A0000-0x00000000043A2000-memory.dmp

    Filesize

    8KB

  • memory/1860-51-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-50-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-6049-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/1860-5702-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2288-6056-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2664-28-0x0000000000400000-0x00000000005B4000-memory.dmp

    Filesize

    1.7MB

  • memory/2800-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2800-13-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-7-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-5-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-1-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-16-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-9-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-3-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-27-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB

  • memory/2800-17-0x0000000000400000-0x0000000000485000-memory.dmp

    Filesize

    532KB