General
-
Target
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118
-
Size
374KB
-
Sample
240917-c1nxgazgpm
-
MD5
e5dff6da6b5ad6933a59d7d62ff9c699
-
SHA1
9144d2847e93495c362bb01955a8da325288f453
-
SHA256
622bc8d9051a4d3cbbde029199aa1c4e0f376185d5c43645c187b344b458eefc
-
SHA512
cc47e1ea5361ea960c18893179aa6f7f2e776dcdd6923fa313cce1705f32831c5d1acb0c0be916516c03347b65a5ae6f50ec336c15ecc56fb8c14e1a9d96a857
-
SSDEEP
6144:Wcs0ZKB8pufhYHAk5Ey8FGilhdUYcV0RFJ+WV:Wcs0ZKipufhcumKhdbfES
Static task
static1
Behavioral task
behavioral1
Sample
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+blixq.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/EF96E617E4228D5
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/EF96E617E4228D5
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/EF96E617E4228D5
http://xlowfznrg4wf7dli.ONION/EF96E617E4228D5
Extracted
C:\Program Files\7-Zip\Lang\_RECoVERY_+mqdnx.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/21673FA16853FE37
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/21673FA16853FE37
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/21673FA16853FE37
http://xlowfznrg4wf7dli.ONION/21673FA16853FE37
Targets
-
-
Target
e5dff6da6b5ad6933a59d7d62ff9c699_JaffaCakes118
-
Size
374KB
-
MD5
e5dff6da6b5ad6933a59d7d62ff9c699
-
SHA1
9144d2847e93495c362bb01955a8da325288f453
-
SHA256
622bc8d9051a4d3cbbde029199aa1c4e0f376185d5c43645c187b344b458eefc
-
SHA512
cc47e1ea5361ea960c18893179aa6f7f2e776dcdd6923fa313cce1705f32831c5d1acb0c0be916516c03347b65a5ae6f50ec336c15ecc56fb8c14e1a9d96a857
-
SSDEEP
6144:Wcs0ZKB8pufhYHAk5Ey8FGilhdUYcV0RFJ+WV:Wcs0ZKipufhcumKhdbfES
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (428) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext
-