General
-
Target
4f66a5b1bb80abbe07697409267d28f5_JaffaCakes118
-
Size
38KB
-
Sample
240716-wccdbawfld
-
MD5
4f66a5b1bb80abbe07697409267d28f5
-
SHA1
c9e4bf287498a31f75660c9935b80c6eb4082fc8
-
SHA256
10e1b47731018be0b25fb40a32f85ac586f5cbe3fb57450818ddec6bafa7d618
-
SHA512
5eedcca7ee841997de04204a2becf00301d54e9970d4e28a4ef4aa0156f00af85eeb0a31e974238644d24c33c042bfa040451a9d0dcb97750c632e9c9cd306b8
-
SSDEEP
768:WgXItQkVssHyWby4FHCStRCGm45ah7soezD3v7h+SHU0GntxVbFe6Eg:WgXP+vniOgGmyaa35Hsxat
Static task
static1
Behavioral task
behavioral1
Sample
4f66a5b1bb80abbe07697409267d28f5_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4f66a5b1bb80abbe07697409267d28f5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt婍
http://b4b04a686e10b470eaitmptmni.pmaev7tzx2wapvo7wgqoaljngomjzzs3d4t53jctdq5cs5imrzjhcgid.onion/aitmptmni
http://b4b04a686e10b470eaitmptmni.uscatch.club/aitmptmni
http://b4b04a686e10b470eaitmptmni.roomsum.xyz/aitmptmni
http://b4b04a686e10b470eaitmptmni.flyput.site/aitmptmni
http://b4b04a686e10b470eaitmptmni.knewago.quest/aitmptmni
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://10ac06e00ef8ba30f6aitmptmni.pmaev7tzx2wapvo7wgqoaljngomjzzs3d4t53jctdq5cs5imrzjhcgid.onion/aitmptmni
http://10ac06e00ef8ba30f6aitmptmni.uscatch.club/aitmptmni
http://10ac06e00ef8ba30f6aitmptmni.roomsum.xyz/aitmptmni
http://10ac06e00ef8ba30f6aitmptmni.flyput.site/aitmptmni
http://10ac06e00ef8ba30f6aitmptmni.knewago.quest/aitmptmni
Targets
-
-
Target
4f66a5b1bb80abbe07697409267d28f5_JaffaCakes118
-
Size
38KB
-
MD5
4f66a5b1bb80abbe07697409267d28f5
-
SHA1
c9e4bf287498a31f75660c9935b80c6eb4082fc8
-
SHA256
10e1b47731018be0b25fb40a32f85ac586f5cbe3fb57450818ddec6bafa7d618
-
SHA512
5eedcca7ee841997de04204a2becf00301d54e9970d4e28a4ef4aa0156f00af85eeb0a31e974238644d24c33c042bfa040451a9d0dcb97750c632e9c9cd306b8
-
SSDEEP
768:WgXItQkVssHyWby4FHCStRCGm45ah7soezD3v7h+SHU0GntxVbFe6Eg:WgXP+vniOgGmyaa35Hsxat
Score10/10-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-