Resubmissions

16-08-2024 12:27

240816-pm43raycrm 10

Analysis

  • max time kernel
    141s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-08-2024 12:27

General

  • Target

    9e5c89c84cdbf460fc6857c4e32dafdf_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    9e5c89c84cdbf460fc6857c4e32dafdf

  • SHA1

    ee0a95846ce48c59261eda0fdd6b38dfc83d9f4d

  • SHA256

    dfecb46078038bcfa9d0b8db18bdc0646f33bad55ee7dd5ee46e61c6cf399620

  • SHA512

    6da517ae5159ebcb0ac138b34215924fb21adae619c3c15ede6863866648e445633f482b2beaddbe74de66b48e18d106dbde3253ee2d3ce86da667f7f8494cd8

  • SSDEEP

    1536:7ufJPTAoUei1obcxtZbW3BqlIS2IyUY4h2wEsOolJT+y9v:7upTAneif03BqarUY4l

Malware Config

Extracted

Path

C:\Users\Admin\3D Objects\DECRYPT-QCDPay-decrypt.hta

Ransom Note
<!DOCTYPE html><html lang="en"><head><meta charset="UTF-8"><meta name="viewport" content="width=device-width, initial-scale=1.0"><title>QCDPay Decrypt</title><style type="text/css">body { text-align: center; background: rgb(192, 176, 176); color: black; font-family: Arial, Helvetica, sans-serif; font-size: 14pt;}a { cursor: pointer; color: rgb(68, 68, 68);}textarea { width: 90%; height: 200px; background: black; color: white; border: 1px solid black; font-size: 12pt; font-weight: bold;}</style></head><body><h1>QCDPay Decrypt</h1><h3>All your data has been encrypted with Exorcist 2.0 Ransomware.</h3><h3>Do not worry: you have some hours to contact us and decrypt your data by paying a ransom.</h3><h3>If you don't pay in time, price will be increased. Then, if the payment is still not received, your keys will be destroyed.</h3><h3>To do this, install Tor Browser (here: <a href='https://www.torproject.org/download/'>https://www.torproject.org/download/</a>) and follow instructions on this web site: <a href='http://7iulpt5i6whht6zo2r52f7vptxtjxs3vfcdxxazllikrtqpupn4epnqd.onion/'>http://7iulpt5i6whht6zo2r52f7vptxtjxs3vfcdxxazllikrtqpupn4epnqd.onion/</a></h3><h3>IMPORTANT: Do not modify this file, otherwise you will not be able to recover your data!</h3><hr><h2>Your authorization key:</h2><textarea readonly>Nvf6NPsvzmLPymJl6JACK8o1ItMTT345jNKFakHZqQJuD3LsTBSIan0uDgAo/L4J MiZiCvhneooqxrQ8vS/7QBkjGkL73Gx9MIHCozv25PFvJT/JEdDTRVgSiI6hDMno GZ8/vOh6Hl1OOAKGonq/mim2Pn9qnIx9BpYT/FfZdJnDNY+IyRFlTWJdIxIsf1HN ZIwcrsuw6+FzEt2XXweMV7TOESVq7jyswEV/QOwnF+H2Yk7QhJhGR64AnLulq1Q4 bglMuQ2JxYBhAV2Efguxc2LxCs+uSty+kFsZrLxpF9pcRskrHw/e41esqD0x/P3V GHQ8GfarbzhWezxGSz7XpPK5Vuds/MdLFrq+J6Qf1ODQlRHHxTfOHlstEEKRMDvy JAWlnwZLc3fBPHV0uK3EblfXi4rhH87yaZcyc8P4qssvVfWzb0prekiP6AK38wsr EpBXZ9Tlnfvv5H9+OQGV+U2lAS7WKPDPigFachcIzwMpqnV4wJ3v+pnGHNbW/XfW xitZ8LikOKRu5pwvDwRpxpB0KpR75HwrUnYaLT3qgTCxt90/p9M4cERn35zlEJ8N SoAPs/hnRej51CzibPHrGNVbA/m/cqsvDv4EA7yPIe/sC1BLpgnwnoU2/Gg7E6sr isvvoqPGWE5gaVJ0cwG50hXQSpD3A1KcRzd8UfSDQ5LESqe4wf0XDPEhVZpQ1Vbc w4zt0BjYPjY15I2U2BfpybeDcbTQB3OnWXwfgXYVb7Zh8Qt2SlzVUo4cIZeZ9FXI TC9a0/uCjf3i9ks8+SWfOtPTsARkBM28Ilqely+0qKQZb2QhQSaiK3fdSjt6i0DI /6f0zzVvpKDZdGqvbrNZGf7E85YcDkV5M/+XnRPHDI2bIR78dKNApR2FVYkR38K9 MrK2xZhjcVN5XOQVfKeOGE4giR3B2VDR38+U1D4BPTWlvSCzS6eunzLndFZGYTCd wT/rwJGbziPbLN6OAms8L55Q2NOVU86Socl0UAq5Qz1ekSd+/4Ln81t1jM95beVl KiNIZlE4uA4Jal6U3S9cgKqVaZkxLOfehC9GuNQNTJTGnrmE7fDkkpMO+cQvXRlk 2VVhALeXNOxOqr8OqOuas3fL8rGf2gCz9R+xx7E99Me6726jxr0PW1IHbX04gFlq MYwFlLudxft7aA+T8V4C/cpQpw5VPHRclARFCkgcQiF0A38BOrwb8rodOJu5Qy6j +4s5IeE6k4Kiu3gmvnEMY/t5CyuDo6M5O4gnAw6nI/O0l68frfGOV6uxnRQ0T2Jd 90fpe3bwsgHIAuGSNnVxnw6lvTa8xSTmpH+TSpulZHYQ1JNLMDVlkopUI2fPSthk kaQMnO+Mn/MNoByKd+h+FDt1yHt/QHLHHWj+O9pzHAxkk+Rhx8pO53shQAJ8iiQ6 T9hX6ZL1KOljNJs708ptC9bTCbCNpwNT6SGHIjF4qYkPYLuW59cvDlMlVdrwffA8 wYOwderDtD2npHfTrh2IQLATRUG7zIM+LL4ESmihDpBDJz61FV/9/QXgCTpKNd/3 1BLUjTchjOcoKhAZ35vewKUp8NdUfeKpzM/Q0lE1DjAXaY5SqITRYmxZXM295Xmy 3HpQb1PNten3b0EGTYY0BTn2I7BLYKh15iI513Kgc4t+VodPTBleh4vxzBilGOkt xa6ahXsTzx2YEV5swCfKdQgRXWwHZOB0iBx5lsPiLMfPldJEFWwYR9z9EXnIh7Ea Bq5S4YZbPvNehCtXerxhzbvGR50FQX0NsScy5STOs5l0AhMY3qLA8a17UFCX38Ve IeOVq6bPkaibCoGle+ZXBFy6zjYd7o0g0yjXoY3nxAAuNjdDj5+tlr8gchxhfeI0 Y93un2VfdWdZvmSLuWLrXPcZqyP8Anvw3/7Bki0gpfKbKBpKxyiXzebwtmRAGquV l2XfudUNIbfcH0PIV2trYibyww/6O3tAANEt5ILy7nJzFlox/y+mUykh36GGIqMV 8wzI/kTRfSewCTmWVLF6fkSOO+ESHNuzg/RKWhxknWVaK7r50g0pTg1LzpyCbphK 9QUXytmrrKAfGMI6tHd0cqAZ4NwH3KdSRoVUlcjw+HRTDwI2XEzFw7aJUDdSiPNZ fdGKPmjcb8LOwfYg3rfae7kOAAVvOmDFq5oJo/ifH9CB7CSbyvU27tpYXaP+wz1K Y3cXXeJSd7TPcwfALxKBdeE36dObAa46MQ8NYYAKI5za9yVJE2VTSl0ctAsXYAxW FJn8demRUNRuiLAwjJTfRXJ6siiLFu/K79FScRWjBheCRd7H06tI3C+1HJ9u8Oxq ieaUKsK3uI6rhMzSaeEsbt/CnhWqCW0QNZWj638EnPjdWGehFDUuMSU1z9F53hB5 gkBw6RLSMb7SL8tnqQclu/uUea1LljijkAZ3OWJ3dWx7ZirKDVTBgbMlVvFfHmQm SqboUvQ3R6LS579WIMJggYzOgjqqS8Hqp+t04+tz9HW+nrvPz3N+n+kmLDwJLSxe zQY6m5C5nyQDmPSgDQcbtdeoAdlAT1mzfcY39xkjhdCG4aqjqotkqBFOssNKSCtE 2/6Fm9AL7NO5GGMvWH11AyxMY6g1CfdGdHBjUZ2uxoo3j+GYKgsD5MAUyk5VglPh Fa/oc/cl50fShmVi3PNoaXyoqgS+rm4EkBAVhBC3IT9HJTnCrWM+W8KQY3IR/wQk xpAWJqV72SbGpLtVPqJJlUgo9fKZOgpik/iHKpq/80llkX7j06BsYA7tYZNs/HDL wH0taf5CfGflW3cUaEKWgNPYsx2kmjjKgIZCm4mYs+7FNI/OHA4WRhHmgA2b5ZRH kcxVwQmcFc7z2zJIjPAH6wW/cs0f1QzACcy+qek4jHnmNfX7mHUps+wJOl+5abZ5 OBN00WW2L2dlOn39SuWYMOK/4Tf59WDuH5uOhRJloh2Gfkm6Am1W4f96GDy+M2R3 sjZn926F4jgQ9DnwbTm3JZLl0n2jggmqm959dOklaiqyNoy/pAJ1dZJ1BJ6xw7Ke Dt4Ix15OmOA8g8kWT9FnNfulKVYZaFwBug+H3LX6nEqSrAj04Btd8i0ZSw2ieZWT OIdixoGYw145q4QOsJXPFGGD7/U6q7a2NN5EMuy4MpNPUEBFNihS0SKI+LhF0F2K tpwTroVSyUZqtWotkK9CeHMcfWqFdWjkWWaeyjzDfyVN2WT7ncWmrS1wbJ+Dcxfy 9grJUdFeejCdvneYkULI7AAFJcYApsRkp3FAAKug+RO+oDCQx4yAqnsLBik3rdMq PWXwlGermPsWH8cFDT/LhNOJAPI/sdo3MD8GbNqdh4QducVv2uaj2ZnFeZzmOvan HkxlEdfswJZIneZBcZmhErx54y9JkR2Gw+smkNsjWCxzTQlTajdhdXKWIOL1AjDv zz47rgIWPeLMMmTdOIpotpDoo1/uyY8Fv+HG959RUVChlxAeBv//yA7eXBzwtBTk Seh/BRVQGarfRTKZBePMNC1TmP71Lkc6JfBgUXq6/KRCvIkLjn1rhTXBEm9VgNYS cqeoNZgETtXGchT0Ci0JG/bqNmRxcJi2vn1ftoBxNVFrbQAOic57ZYei5K193vhB zX9Ak36auKV7SvPtCxfaLFd2ddNGN2oWprp+6Y99WqQJGxMT4rCiTvAZmKtYkNNr XfAJkKpJ6yJwC7KLC0M48ROYGLwx9mc3xmMbUKAuZbjikr47tYkJNO64LTuJqX+E kKahWdG/lP4Wg5FDaDYtkL8fysQq7wARqRAsoSgjUG7xDUgtxWii8ZK0puhOp2+l /sSJujf+sCaDST16WHlTKII2Ll+Uc6teAA0sql416b2YfxaF4S+yM4dQmyh50sJq TmG7kmdKhXpGOYCazBSRhrDYCbLk+u+QapoEhAgJCBfMn9bS6V6rtA8atkvkewLM Kv6GCL99E8ekjvWIgI7cRIGsx5elDa96v/XH/+jQt26sfdPJycvpcJtJmY0YM1ba ipjAiBT55EvuyPc1jLk4wJh871c5vCTQ2YVEN2HQKfyFatx/Y8qVkRg+b1t6FZZf nBQOMEShjjTrGaU8ocGO9djugsLkwTy6sInpd8vEiISRcX8n9fjJCyQzql/KMrwF RwkgzACkkd5GNrtPS1m9oS2Afkzt4/z1IdX0HULrolYa4f1Tua7hxfcqM//qDoHa O576JRLByuMi70t83J8TX8HSk0xvuSI4zt9uSnMq+3AXjhWbY08G4saL+MHVQ9vF 9++Zkhbg+AZEYxhulBAcIRfxolclLk/zJQGyXjPnFVGehOij6VlLo6o+TrHbjhdl kvPEkCiwVnDmX3uARm6sfa9CfTrFLIj9/krIE/9axG4M/HDgStpXHxfcIyruPDN4 zdz1w5WH4SSQ1MG/p/vNkNuwsK5lnux+cb6At9Xhc2mXX90/a+HbDCkE486R1LjX LqpN1fSigIFvwJpbHOsBoE+MzUfpzHPIBsDrrz90xyjMvaCMFlGmCa9HCW571olG wXdaOPpK44rHUK7SmnQh+vFHBtkSbeA6LjDpHFpvq1z6GYQ//Hl0C1dxVGE1+5Hk daTGzGmls6w5PXCFQpocaSSVS30KfTUkbymze+LPeBWwBxR1xxRmAQ5HKfMIful8 k5Uq3IVpFrtaHA32m9Jvk84hDMnwz81sOF2PodsddJ/wKWd4Zv7TErHJmjqSSI4U XuvwR6EmFn6lSLyNWnRraT6NcFfQQS5D3II+RGWZa5P5qtihc3HtgRMyOuAzcmyu Ulq92QqI3bjuEAxEw5BkWNTJMdpiXD6eC/8hmwROINLe6Ylbo4f7IlTpssgfJZ9w tbyd9ZCvutNbi/bmLwVhzmsTOEJ6UpS/ramSawR6fd6fgV3kS1BsfEOn48TImK9J XhPTMVve2FsqEcfunQXbC8kxh9lQqVo6KHQtc4Hxd8b14uV1GGibJnp/CtJzT8GY oD1UALj3JCYC2+cGf1Vw5U+KMRkooyr6MRA/7JVayNr/22HW2zW5ZBWd1jhTQvfO OTJDdIuL7iWlcTXxL6RpS/lrp2G6FbT7eAhDgQsURlGzV8jG4vxNUpAcHBcOiuOL </textarea></body></html>

Signatures

  • Exorcist Ransomware

    Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.

  • Renames multiple (188) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • NTFS ADS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e5c89c84cdbf460fc6857c4e32dafdf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9e5c89c84cdbf460fc6857c4e32dafdf_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:728
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C vssadmin Delete Shadows /All /Quiet
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2308
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C bcdedit /set {default} recoveryenabled No
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1616
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1288
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C wbadmin DELETE SYSTEMSTATEBACKUP
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1028
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2860
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C wmic SHADOWCOPY /nointeractive
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic SHADOWCOPY /nointeractive
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\3D Objects\DECRYPT-QCDPay-decrypt.hta

    Filesize

    6KB

    MD5

    fc66062dab9008e38a3e9a1e0ed03cf1

    SHA1

    03f040682bd9db182b66d0d24169ede354376386

    SHA256

    681265a65919cd9000154fc2ce7dec3689546547a47b38b0672032e77d35b78b

    SHA512

    278bc9d720e12a463fae1afff5c09a30dbe874b39b375feb528db73a04ef43055bbe03739376df31cd7f1be8da6a0329c0d1af2a6e25f97e58a638de00397516

  • F:\$RECYCLE.BIN\S-1-5-18\desktop.ini

    Filesize

    129B

    MD5

    a526b9e7c716b3489d8cc062fbce4005

    SHA1

    2df502a944ff721241be20a9e449d2acd07e0312

    SHA256

    e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066

    SHA512

    d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88