General
-
Target
be3c7d928663380e88f3fb97bb17b2da_JaffaCakes118
-
Size
20KB
-
Sample
240824-kjksgs1hnb
-
MD5
be3c7d928663380e88f3fb97bb17b2da
-
SHA1
ebaed1467dc8f6b80c5f8bf0a596525979ea2825
-
SHA256
c070f4e29d6d33432b484bfba03b6d66eda0befda54600cb6d4fda4de27a44df
-
SHA512
6d7a286fa2c18fd0fc364d3a8b05538dec250887fb965cd3ce28747e8cfe2334ff8b88ddc03532e83ee804c5ac77a502b080a63a0f1b2a4468cb18b323b90017
-
SSDEEP
384:dLck6pO6NPXcNSHHNGopa6RmR2VZNtEK8H7TqeuB5xtfRlhrrYkQMeg75lb:Fv67u4HHEV6RmgNtEKReuB5xtffhrrY6
Static task
static1
Behavioral task
behavioral1
Sample
be3c7d928663380e88f3fb97bb17b2da_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be3c7d928663380e88f3fb97bb17b2da_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://7280f6a8ae908810b2zmmmgwfp.zokkkgngjqrnmiv3gbm3xcflq2bfgoji7uvyrig6ds2ufrv45jcenzyd.onion/zmmmgwfp
http://7280f6a8ae908810b2zmmmgwfp.sonwear.quest/zmmmgwfp
http://7280f6a8ae908810b2zmmmgwfp.fewacts.space/zmmmgwfp
http://7280f6a8ae908810b2zmmmgwfp.refersa.casa/zmmmgwfp
http://7280f6a8ae908810b2zmmmgwfp.asmoral.site/zmmmgwfp
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://3648941812106ee00ezmmmgwfp.zokkkgngjqrnmiv3gbm3xcflq2bfgoji7uvyrig6ds2ufrv45jcenzyd.onion/zmmmgwfp
http://3648941812106ee00ezmmmgwfp.sonwear.quest/zmmmgwfp
http://3648941812106ee00ezmmmgwfp.fewacts.space/zmmmgwfp
http://3648941812106ee00ezmmmgwfp.refersa.casa/zmmmgwfp
http://3648941812106ee00ezmmmgwfp.asmoral.site/zmmmgwfp
Targets
-
-
Target
be3c7d928663380e88f3fb97bb17b2da_JaffaCakes118
-
Size
20KB
-
MD5
be3c7d928663380e88f3fb97bb17b2da
-
SHA1
ebaed1467dc8f6b80c5f8bf0a596525979ea2825
-
SHA256
c070f4e29d6d33432b484bfba03b6d66eda0befda54600cb6d4fda4de27a44df
-
SHA512
6d7a286fa2c18fd0fc364d3a8b05538dec250887fb965cd3ce28747e8cfe2334ff8b88ddc03532e83ee804c5ac77a502b080a63a0f1b2a4468cb18b323b90017
-
SSDEEP
384:dLck6pO6NPXcNSHHNGopa6RmR2VZNtEK8H7TqeuB5xtfRlhrrYkQMeg75lb:Fv67u4HHEV6RmgNtEKReuB5xtffhrrY6
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (64) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-