General
-
Target
dcdc778ea843b2a8adbaf661df9bcf2b_JaffaCakes118
-
Size
373KB
-
Sample
240912-xnlxkaygnj
-
MD5
dcdc778ea843b2a8adbaf661df9bcf2b
-
SHA1
f609790c27853d16cd0b4d145a56a6a8f5712f90
-
SHA256
f09e5f8878752c555825aaf133b735b67f42a83f2034013dd0fee7d679fcea00
-
SHA512
b3f6440cde12dfd2e414d5cd95dbdfc5c49a1cd84e2f47301bd234d7401ad7a9041bd3207d9e564fa81c610074919eb316723027962b952286e944ab27c5b0c6
-
SSDEEP
6144:lXxVVly0Av8Q2z6Zz8t5iHcTNNVMoaJHuVPsRJL+BzO0RCaqeI4d/IYqSYA:hyX2I7QSHu2UnCzeBFIYqfA
Static task
static1
Behavioral task
behavioral1
Sample
dcdc778ea843b2a8adbaf661df9bcf2b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcdc778ea843b2a8adbaf661df9bcf2b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+eilnj.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/69988E9B5F78BC6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/69988E9B5F78BC6
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/69988E9B5F78BC6
http://xlowfznrg4wf7dli.ONION/69988E9B5F78BC6
Extracted
C:\Program Files\7-Zip\Lang\_RECoVERY_+acsej.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/292BC3C7DA93C1C6
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/292BC3C7DA93C1C6
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/292BC3C7DA93C1C6
http://xlowfznrg4wf7dli.ONION/292BC3C7DA93C1C6
Targets
-
-
Target
dcdc778ea843b2a8adbaf661df9bcf2b_JaffaCakes118
-
Size
373KB
-
MD5
dcdc778ea843b2a8adbaf661df9bcf2b
-
SHA1
f609790c27853d16cd0b4d145a56a6a8f5712f90
-
SHA256
f09e5f8878752c555825aaf133b735b67f42a83f2034013dd0fee7d679fcea00
-
SHA512
b3f6440cde12dfd2e414d5cd95dbdfc5c49a1cd84e2f47301bd234d7401ad7a9041bd3207d9e564fa81c610074919eb316723027962b952286e944ab27c5b0c6
-
SSDEEP
6144:lXxVVly0Av8Q2z6Zz8t5iHcTNNVMoaJHuVPsRJL+BzO0RCaqeI4d/IYqSYA:hyX2I7QSHu2UnCzeBFIYqfA
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (308) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext
-