General
-
Target
d3f2742f51910fb4a22103fdf1b21487_JaffaCakes118
-
Size
336KB
-
Sample
240908-kdl4csyaka
-
MD5
d3f2742f51910fb4a22103fdf1b21487
-
SHA1
ae106a029a3c157ece018ea2b23e97fc4a039357
-
SHA256
b464d0c13debdd28629b1b90a007540ceb7fc4126948c56e46df11c84dbb5038
-
SHA512
5d4638b814d939c600369cf0f3c4dc24e2d9be85752d9450b5d8c05b216bea2761b70e76fd99b48f6f1891a87d2b0d494527fa4cc1c17236f354bfa8953fc991
-
SSDEEP
6144:6dVu4o9uXRkondkyLVLcHBf0CNI4W8WOAHAU9M8NVgEzeJgF6vE8O5:yVuzaRkondlVLchfazOAgU9MQbzeJe
Static task
static1
Behavioral task
behavioral1
Sample
d3f2742f51910fb4a22103fdf1b21487_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3f2742f51910fb4a22103fdf1b21487_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+ljtvu.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/F75EA3C6D4D0485F
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/F75EA3C6D4D0485F
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/F75EA3C6D4D0485F
http://xlowfznrg4wf7dli.ONION/F75EA3C6D4D0485F
Targets
-
-
Target
d3f2742f51910fb4a22103fdf1b21487_JaffaCakes118
-
Size
336KB
-
MD5
d3f2742f51910fb4a22103fdf1b21487
-
SHA1
ae106a029a3c157ece018ea2b23e97fc4a039357
-
SHA256
b464d0c13debdd28629b1b90a007540ceb7fc4126948c56e46df11c84dbb5038
-
SHA512
5d4638b814d939c600369cf0f3c4dc24e2d9be85752d9450b5d8c05b216bea2761b70e76fd99b48f6f1891a87d2b0d494527fa4cc1c17236f354bfa8953fc991
-
SSDEEP
6144:6dVu4o9uXRkondkyLVLcHBf0CNI4W8WOAHAU9M8NVgEzeJgF6vE8O5:yVuzaRkondlVLchfazOAgU9MQbzeJe
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (409) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-