General
-
Target
b548a2e179907d05b6b91de5db865957_JaffaCakes118
-
Size
360KB
-
Sample
240616-z96j7ssfpm
-
MD5
b548a2e179907d05b6b91de5db865957
-
SHA1
c472e35f13fd7a3a5a5b2bb9cf0683bbfa6faf03
-
SHA256
6476dc4d4cf45ff08448309f65e1702c2770a93ef002475294c546e19bd717f0
-
SHA512
4318e7b12bf2cf14d190e91b30313484efbba370f166829e58a43c19d5e479f3167dfc9cbe7d0683d73f245d4b2ee752ec6007811c4a879ae51a133048bcffd9
-
SSDEEP
6144:HSfBiH4YIwLseDtcixL1V02VcKUGstieOWEK0kVW:ygp1hcil1VBueNxnIW
Static task
static1
Behavioral task
behavioral1
Sample
b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+jjvga.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/17938D1015972AC
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/17938D1015972AC
http://yyre45dbvn2nhbefbmh.begumvelic.at/17938D1015972AC
http://xlowfznrg4wf7dli.ONION/17938D1015972AC
Extracted
C:\PerfLogs\_ReCoVeRy_+ytpvy.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E36DCC57BC7393AA
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E36DCC57BC7393AA
http://yyre45dbvn2nhbefbmh.begumvelic.at/E36DCC57BC7393AA
http://xlowfznrg4wf7dli.ONION/E36DCC57BC7393AA
Targets
-
-
Target
b548a2e179907d05b6b91de5db865957_JaffaCakes118
-
Size
360KB
-
MD5
b548a2e179907d05b6b91de5db865957
-
SHA1
c472e35f13fd7a3a5a5b2bb9cf0683bbfa6faf03
-
SHA256
6476dc4d4cf45ff08448309f65e1702c2770a93ef002475294c546e19bd717f0
-
SHA512
4318e7b12bf2cf14d190e91b30313484efbba370f166829e58a43c19d5e479f3167dfc9cbe7d0683d73f245d4b2ee752ec6007811c4a879ae51a133048bcffd9
-
SSDEEP
6144:HSfBiH4YIwLseDtcixL1V02VcKUGstieOWEK0kVW:ygp1hcil1VBueNxnIW
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (421) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-