Analysis

  • max time kernel
    149s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 02:51

General

  • Target

    dbae9888aa3dfd015e4e1b91961333b2_JaffaCakes118.exe

  • Size

    414KB

  • MD5

    dbae9888aa3dfd015e4e1b91961333b2

  • SHA1

    4171e53023cc452393dd11f128fd971deae613a7

  • SHA256

    6d7b3d5696d4c8199a46bdc6f9f6d8310cb8052c5cca92dd91da819c53622654

  • SHA512

    91f11c53b9d8c5bd0085e993206344fa9a3b01426d32a8647703a1c4046ea6db89e38c1a6db6debf2e6cc9df4b2aa225e3b551eb51c1004581c01d4c72cd31cc

  • SSDEEP

    6144:81gNhF7mMk80a3Lsls6r/qqkdb+FoetPeh6mJbYXGf5yh/oJyBFThmBcjUm:pNW8h3Los6ryG0FJcXlQJyvEcjUm

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
YOUR FILES ARE ENCRYPTED Don't worry,you can return all your files! If you want to restore them, follow this link: zombietry4o3nzeh.onion/?ticket=6aWH6i3Gxp3cXPpqzl_38139B9E Use Tor Browser to access this address. If you have not been answered via the link within 12 hours, write to us by e-mail: [email protected] Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
URLs

http://zombietry4o3nzeh.onion/?ticket=6aWH6i3Gxp3cXPpqzl_38139B9E

Signatures

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (315) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbae9888aa3dfd015e4e1b91961333b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbae9888aa3dfd015e4e1b91961333b2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\dbae9888aa3dfd015e4e1b91961333b2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\dbae9888aa3dfd015e4e1b91961333b2_JaffaCakes118.exe
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2872
        • C:\Windows\system32\mode.com
          mode con cp select=1251
          4⤵
            PID:1368
          • C:\Windows\system32\vssadmin.exe
            vssadmin delete shadows /all /quiet
            4⤵
            • Interacts with shadow copies
            PID:2848
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:592
          • C:\Windows\system32\mode.com
            mode con cp select=1251
            4⤵
              PID:2696
            • C:\Windows\system32\vssadmin.exe
              vssadmin delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:1744
          • C:\Windows\System32\mshta.exe
            "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
            3⤵
            • Modifies Internet Explorer settings
            PID:2924
          • C:\Windows\System32\mshta.exe
            "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
            3⤵
            • Modifies Internet Explorer settings
            PID:3004
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1712

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

        Filesize

        7KB

        MD5

        b88c9cf042c5ae1c8c37188e8c440212

        SHA1

        ac9cdc6c434d13d547f417c0671959ab71cd33c1

        SHA256

        e82e2852d06fff67713adbd8a2c47753db619d0b3b021148ac48cec0b97e7dce

        SHA512

        b76b4ae1a538514ead4507bde937ece99f4a9686e5301e7b239183bd4213316ab0f51a3665bfa211df41cfdfa8b0f3e7b745774b7ad27f8f0b461b3b6b20e874

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\3310a4fa6cb9c60504498d7eea986fc2_f9da27c9-c625-43c3-9b3a-b1344b01e128

        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • memory/2620-10792-0x0000000000400000-0x0000000000419000-memory.dmp

        Filesize

        100KB

      • memory/3020-0-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/3020-2-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/3020-3-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/3020-4-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/3020-5-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/3020-10-0x00000000043F0000-0x00000000044BA000-memory.dmp

        Filesize

        808KB

      • memory/3020-9-0x0000000001F60000-0x0000000001F78000-memory.dmp

        Filesize

        96KB

      • memory/3020-8-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB

      • memory/3020-15-0x0000000000400000-0x00000000004CA000-memory.dmp

        Filesize

        808KB