General

  • Target

    6ff1ca648505fe8bea6b4a26616b9722_JaffaCakes118

  • Size

    4.8MB

  • Sample

    240730-qaa5ksvamf

  • MD5

    6ff1ca648505fe8bea6b4a26616b9722

  • SHA1

    7020b4d9e700b697d507a61bffea12c9475a23d2

  • SHA256

    7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365

  • SHA512

    e65d67e22807e1a539997bd763fc6063226fce207c57b3b0316ef7640471f460016fa5f58feb006ff96dd7a2cf5bcff7c17f0af763e8518431fe13ce6d8c9db2

  • SSDEEP

    98304:zDAjjvoF+Cp+/bbbbp7FO1gTL9M5gmoZHOoOVsHalI:zuvAObbbbp78+VwzV0alI

Malware Config

Targets

    • Target

      6ff1ca648505fe8bea6b4a26616b9722_JaffaCakes118

    • Size

      4.8MB

    • MD5

      6ff1ca648505fe8bea6b4a26616b9722

    • SHA1

      7020b4d9e700b697d507a61bffea12c9475a23d2

    • SHA256

      7b7c16367746efe7583ae46235b2f062ce44602dda990c9a11a730d619b8d365

    • SHA512

      e65d67e22807e1a539997bd763fc6063226fce207c57b3b0316ef7640471f460016fa5f58feb006ff96dd7a2cf5bcff7c17f0af763e8518431fe13ce6d8c9db2

    • SSDEEP

      98304:zDAjjvoF+Cp+/bbbbp7FO1gTL9M5gmoZHOoOVsHalI:zuvAObbbbp78+VwzV0alI

    • Avaddon

      Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.

    • Avaddon payload

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (195) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks