Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 21:26

General

  • Target

    b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe

  • Size

    360KB

  • MD5

    b548a2e179907d05b6b91de5db865957

  • SHA1

    c472e35f13fd7a3a5a5b2bb9cf0683bbfa6faf03

  • SHA256

    6476dc4d4cf45ff08448309f65e1702c2770a93ef002475294c546e19bd717f0

  • SHA512

    4318e7b12bf2cf14d190e91b30313484efbba370f166829e58a43c19d5e479f3167dfc9cbe7d0683d73f245d4b2ee752ec6007811c4a879ae51a133048bcffd9

  • SSDEEP

    6144:HSfBiH4YIwLseDtcixL1V02VcKUGstieOWEK0kVW:ygp1hcil1VBueNxnIW

Malware Config

Extracted

Path

C:\PerfLogs\_ReCoVeRy_+ytpvy.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E36DCC57BC7393AA 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E36DCC57BC7393AA 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/E36DCC57BC7393AA If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/E36DCC57BC7393AA 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E36DCC57BC7393AA http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E36DCC57BC7393AA http://yyre45dbvn2nhbefbmh.begumvelic.at/E36DCC57BC7393AA Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/E36DCC57BC7393AA
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E36DCC57BC7393AA

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E36DCC57BC7393AA

http://yyre45dbvn2nhbefbmh.begumvelic.at/E36DCC57BC7393AA

http://xlowfznrg4wf7dli.ONION/E36DCC57BC7393AA

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (877) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\ixsjdoortpnw.exe
      C:\Windows\ixsjdoortpnw.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1616
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1728
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\B548A2~1.EXE
      2⤵
        PID:1720
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4408
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3612 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2960

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PerfLogs\_ReCoVeRy_+ytpvy.html

        Filesize

        12KB

        MD5

        b49e815c35c1cc2803508f5411625222

        SHA1

        a1bcdb9fd9cc76acb69176155ffa902989aa4959

        SHA256

        b0bc15638f6013426d38213e4723e6823653859bea6d49bee1567fc25c80e923

        SHA512

        429306c684100c7afcd2fce90b083f8e68a4dea0bd682b1acb3bec3c4b6f057e752f38ec7f9f90070763bf7ee516c8cc8bdcb22d93e4edc28454fd8d5e94dcd3

      • C:\PerfLogs\_ReCoVeRy_+ytpvy.png

        Filesize

        65KB

        MD5

        1d7fe3f56af2fd5753d4035612ed9229

        SHA1

        2cfd47ad324836287d911d2ecb200be652cc36e3

        SHA256

        50b5a30c94bcb327a47f8be7d9362295b57b00d04bc6e7e2d55c390150e36b34

        SHA512

        bdc1defbdd6050ecc2983d9fc69cea0813ae2bce7a3d24876dab329be09f56513da580a0a10f7218d0d19b6c13d4d5240eecb7215ee8fb396ffd33478d326cfe

      • C:\PerfLogs\_ReCoVeRy_+ytpvy.txt

        Filesize

        1KB

        MD5

        b458b0a19d4fc25222f8ba294dd045fb

        SHA1

        5bc8c4dd72fd9cf21117cc0df451a1d4a4f85357

        SHA256

        a2a24d7eabc389d72a5b22ee26be29a27f7fd38a53b94f3362760d1e6f9c49ef

        SHA512

        47d0670d638800dd0f472b61945693d906e86a2ca50af8170c72feba48542ed6d9b699c51485fabacfb3fef93762c662348a224c5fcbfc37ccea4f66472c1d58

      • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

        Filesize

        560B

        MD5

        07851057d3073507afb47a0e46205bc9

        SHA1

        f103398d78e3bbe53306158810063cd135876c2f

        SHA256

        27342a2db5cec1268d90e31fc117462299bd291ddea59d2a84dc29a9d03ceeda

        SHA512

        37b2530d7fa5ae85323a1d8e3c476b8760210afd15af2c2e6af8f62733e6003443d5963ca0236a8a4eec9f942b4ea7ea2808d82e27c8e7fb9e952ce65f88fda2

      • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

        Filesize

        560B

        MD5

        32447a32c7fc54a8db546152e61ac4b5

        SHA1

        ad3dfd2ac6fe7491eba7a98fad347d3a1de9ea85

        SHA256

        5f910b9c10b75cb7fa3f16095400164ba81de26f5ecb714652ca9cc7bb91d64d

        SHA512

        229a453a51c40b98470f5a56c7a6427496e3ef81e2be8e017a9e7cd4e4fa18679e187e73a1c908fc6c90d869d8813793014707e3b3437ebadeb45509910dec70

      • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

        Filesize

        416B

        MD5

        0ad429252ef1868b09eeeb2f06548955

        SHA1

        032f157d0a0b3b29beff034fb20d248589ea785d

        SHA256

        48c5daa04c611baf4971c2ab29c53eeb38335df66f3f97c5f1b05ff83eea6cd1

        SHA512

        ea1ed493c74a0396898e95193b5465a35c8908b6db97922eb44dfa18a87ac1c742f1204929a37d36144add25694e60a7b8da3232d9bc37c1069f832d04bf0dd9

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133534305838784240.txt

        Filesize

        77KB

        MD5

        d667d46d42e8ecb1c4c211fc89f1b512

        SHA1

        d5649a6bebcc2933cae8a8f4b7d1194dfc526f5b

        SHA256

        267bb652a17baad281479275c94949a7e421aa0838107d286c1c23d7df6ac5f7

        SHA512

        0e723412c39ae68454cc9dad2323706dffa7cece1f00f95b6c207efa66a630b3311c308c8914a35060fea4feb83a49aa5f3130f7ccef784311cae31849b91dd9

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133534325129811261.txt

        Filesize

        74KB

        MD5

        97b0161a89bd3f8156175f374830ab3e

        SHA1

        57d41fdc39f2f3d03d467af6069d8c585a033f80

        SHA256

        cae33f1f6437580e426013cd60265772dcb32f50f9837d7dcb2246278e782c6d

        SHA512

        d4c5dd98b659db6b8dedada447e85e942d2e3c2d92e275964ad29687972593182073893ea4e55c004552e26ee3453abdc890146969f0ff34615e72c9e07efeec

      • C:\Windows\ixsjdoortpnw.exe

        Filesize

        360KB

        MD5

        b548a2e179907d05b6b91de5db865957

        SHA1

        c472e35f13fd7a3a5a5b2bb9cf0683bbfa6faf03

        SHA256

        6476dc4d4cf45ff08448309f65e1702c2770a93ef002475294c546e19bd717f0

        SHA512

        4318e7b12bf2cf14d190e91b30313484efbba370f166829e58a43c19d5e479f3167dfc9cbe7d0683d73f245d4b2ee752ec6007811c4a879ae51a133048bcffd9

      • memory/1616-1021-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-5828-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-599-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-10345-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-9380-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-8451-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-12-0x0000000002030000-0x00000000020B6000-memory.dmp

        Filesize

        536KB

      • memory/1616-1128-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-1564-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-2382-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-3151-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-3778-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-4562-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-299-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/1616-7263-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/4900-14-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/4900-2-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/4900-0-0x0000000002250000-0x00000000022D6000-memory.dmp

        Filesize

        536KB

      • memory/4900-24-0x0000000000400000-0x000000000049D000-memory.dmp

        Filesize

        628KB

      • memory/4900-25-0x0000000002250000-0x00000000022D6000-memory.dmp

        Filesize

        536KB