Analysis

  • max time kernel
    155s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 21:26

General

  • Target

    b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe

  • Size

    360KB

  • MD5

    b548a2e179907d05b6b91de5db865957

  • SHA1

    c472e35f13fd7a3a5a5b2bb9cf0683bbfa6faf03

  • SHA256

    6476dc4d4cf45ff08448309f65e1702c2770a93ef002475294c546e19bd717f0

  • SHA512

    4318e7b12bf2cf14d190e91b30313484efbba370f166829e58a43c19d5e479f3167dfc9cbe7d0683d73f245d4b2ee752ec6007811c4a879ae51a133048bcffd9

  • SSDEEP

    6144:HSfBiH4YIwLseDtcixL1V02VcKUGstieOWEK0kVW:ygp1hcil1VBueNxnIW

Malware Config

Extracted

Path

C:\PerfLogs\_ReCoVeRy_+ytpvy.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E36DCC57BC7393AA 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E36DCC57BC7393AA 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/E36DCC57BC7393AA If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/E36DCC57BC7393AA 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E36DCC57BC7393AA http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E36DCC57BC7393AA http://yyre45dbvn2nhbefbmh.begumvelic.at/E36DCC57BC7393AA Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/E36DCC57BC7393AA
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E36DCC57BC7393AA

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E36DCC57BC7393AA

http://yyre45dbvn2nhbefbmh.begumvelic.at/E36DCC57BC7393AA

http://xlowfznrg4wf7dli.ONION/E36DCC57BC7393AA

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (877) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b548a2e179907d05b6b91de5db865957_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\ixsjdoortpnw.exe
      C:\Windows\ixsjdoortpnw.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1616
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1728
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\B548A2~1.EXE
      2⤵
        PID:1720
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4408
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3612 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2960

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\PerfLogs\_ReCoVeRy_+ytpvy.html

              Filesize

              12KB

              MD5

              b49e815c35c1cc2803508f5411625222

              SHA1

              a1bcdb9fd9cc76acb69176155ffa902989aa4959

              SHA256

              b0bc15638f6013426d38213e4723e6823653859bea6d49bee1567fc25c80e923

              SHA512

              429306c684100c7afcd2fce90b083f8e68a4dea0bd682b1acb3bec3c4b6f057e752f38ec7f9f90070763bf7ee516c8cc8bdcb22d93e4edc28454fd8d5e94dcd3

            • C:\PerfLogs\_ReCoVeRy_+ytpvy.png

              Filesize

              65KB

              MD5

              1d7fe3f56af2fd5753d4035612ed9229

              SHA1

              2cfd47ad324836287d911d2ecb200be652cc36e3

              SHA256

              50b5a30c94bcb327a47f8be7d9362295b57b00d04bc6e7e2d55c390150e36b34

              SHA512

              bdc1defbdd6050ecc2983d9fc69cea0813ae2bce7a3d24876dab329be09f56513da580a0a10f7218d0d19b6c13d4d5240eecb7215ee8fb396ffd33478d326cfe

            • C:\PerfLogs\_ReCoVeRy_+ytpvy.txt

              Filesize

              1KB

              MD5

              b458b0a19d4fc25222f8ba294dd045fb

              SHA1

              5bc8c4dd72fd9cf21117cc0df451a1d4a4f85357

              SHA256

              a2a24d7eabc389d72a5b22ee26be29a27f7fd38a53b94f3362760d1e6f9c49ef

              SHA512

              47d0670d638800dd0f472b61945693d906e86a2ca50af8170c72feba48542ed6d9b699c51485fabacfb3fef93762c662348a224c5fcbfc37ccea4f66472c1d58

            • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

              Filesize

              560B

              MD5

              07851057d3073507afb47a0e46205bc9

              SHA1

              f103398d78e3bbe53306158810063cd135876c2f

              SHA256

              27342a2db5cec1268d90e31fc117462299bd291ddea59d2a84dc29a9d03ceeda

              SHA512

              37b2530d7fa5ae85323a1d8e3c476b8760210afd15af2c2e6af8f62733e6003443d5963ca0236a8a4eec9f942b4ea7ea2808d82e27c8e7fb9e952ce65f88fda2

            • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

              Filesize

              560B

              MD5

              32447a32c7fc54a8db546152e61ac4b5

              SHA1

              ad3dfd2ac6fe7491eba7a98fad347d3a1de9ea85

              SHA256

              5f910b9c10b75cb7fa3f16095400164ba81de26f5ecb714652ca9cc7bb91d64d

              SHA512

              229a453a51c40b98470f5a56c7a6427496e3ef81e2be8e017a9e7cd4e4fa18679e187e73a1c908fc6c90d869d8813793014707e3b3437ebadeb45509910dec70

            • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

              Filesize

              416B

              MD5

              0ad429252ef1868b09eeeb2f06548955

              SHA1

              032f157d0a0b3b29beff034fb20d248589ea785d

              SHA256

              48c5daa04c611baf4971c2ab29c53eeb38335df66f3f97c5f1b05ff83eea6cd1

              SHA512

              ea1ed493c74a0396898e95193b5465a35c8908b6db97922eb44dfa18a87ac1c742f1204929a37d36144add25694e60a7b8da3232d9bc37c1069f832d04bf0dd9

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133534305838784240.txt

              Filesize

              77KB

              MD5

              d667d46d42e8ecb1c4c211fc89f1b512

              SHA1

              d5649a6bebcc2933cae8a8f4b7d1194dfc526f5b

              SHA256

              267bb652a17baad281479275c94949a7e421aa0838107d286c1c23d7df6ac5f7

              SHA512

              0e723412c39ae68454cc9dad2323706dffa7cece1f00f95b6c207efa66a630b3311c308c8914a35060fea4feb83a49aa5f3130f7ccef784311cae31849b91dd9

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133534325129811261.txt

              Filesize

              74KB

              MD5

              97b0161a89bd3f8156175f374830ab3e

              SHA1

              57d41fdc39f2f3d03d467af6069d8c585a033f80

              SHA256

              cae33f1f6437580e426013cd60265772dcb32f50f9837d7dcb2246278e782c6d

              SHA512

              d4c5dd98b659db6b8dedada447e85e942d2e3c2d92e275964ad29687972593182073893ea4e55c004552e26ee3453abdc890146969f0ff34615e72c9e07efeec

            • C:\Windows\ixsjdoortpnw.exe

              Filesize

              360KB

              MD5

              b548a2e179907d05b6b91de5db865957

              SHA1

              c472e35f13fd7a3a5a5b2bb9cf0683bbfa6faf03

              SHA256

              6476dc4d4cf45ff08448309f65e1702c2770a93ef002475294c546e19bd717f0

              SHA512

              4318e7b12bf2cf14d190e91b30313484efbba370f166829e58a43c19d5e479f3167dfc9cbe7d0683d73f245d4b2ee752ec6007811c4a879ae51a133048bcffd9

            • memory/1616-1021-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-5828-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-599-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-10345-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-9380-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-8451-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-12-0x0000000002030000-0x00000000020B6000-memory.dmp

              Filesize

              536KB

            • memory/1616-1128-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-1564-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-2382-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-3151-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-3778-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-4562-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-299-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/1616-7263-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/4900-14-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/4900-2-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/4900-0-0x0000000002250000-0x00000000022D6000-memory.dmp

              Filesize

              536KB

            • memory/4900-24-0x0000000000400000-0x000000000049D000-memory.dmp

              Filesize

              628KB

            • memory/4900-25-0x0000000002250000-0x00000000022D6000-memory.dmp

              Filesize

              536KB