Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 07:57

General

  • Target

    00442a088456ce18a43187605557b3d1_JaffaCakes118.exe

  • Size

    344KB

  • MD5

    00442a088456ce18a43187605557b3d1

  • SHA1

    d02f19accf695508bc31a650539934d8ea46fb15

  • SHA256

    d8ee200589d8e7d72878ea79bcfc9d18ee52569c046df74fa0dfe7e33d9ec422

  • SHA512

    62d65da6e38ceae67845d44fe979941049d54075ca16ff0ed6b6db3379ccc30df55da5a4a2926e52147a48f0c11c2283fc1ee06864e8605bf31fb77b766656a7

  • SSDEEP

    6144:V6DdOsqgCFKNnhMA6GOopUtQ9KIwD13KJ181KUO:sZOsSwhCGbWWu13E0

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\{RecOveR}-houjp__.Txt

Ransom Note
$2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA-4096 https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 It means that on a structural level your files have been transformed . You won't be able to use , read , see or work with them anymore . In other words they are useless , however , there is a possibility to restore them with our help . What exactly happened to your files ??? *** Two personal RSA-4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key , which you received over the web . *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 What should you do next ? There are several options for you to consider : *** You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or *** You can start getting BitCoins right now and get access to your data quite fast . In case you have valuable files , we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions , please access your personal homepage by choosing one of the few addresses down below : http://h3ds4.maconslab.com/408F1196AF7A8BEE http://aq3ef.goimocoa.at/408F1196AF7A8BEE http://fl43s.toabolt.at/408F1196AF7A8BEE If you can't access your personal homepage or the addresses are not working, complete the following steps: *** Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en *** Install TOR Browser and open TOR Browser *** Insert the following link in the address bar: xzjvzkgjxebzreap.onion/408F1196AF7A8BEE $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 ***************IMPORTANT*****************INFORMATION******************** Your personal homepages http://h3ds4.maconslab.com/408F1196AF7A8BEE http://aq3ef.goimocoa.at/408F1196AF7A8BEE http://fl43s.toabolt.at/408F1196AF7A8BEE Your personal homepage Tor-Browser xzjvzkgjxebzreap.onion/408F1196AF7A8BEE Your personal ID 408F1196AF7A8BEE $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9 $2&)"(1%?2>/#'1=."#$<-!6#:+ 8(9
URLs

http://h3ds4.maconslab.com/408F1196AF7A8BEE

http://aq3ef.goimocoa.at/408F1196AF7A8BEE

http://fl43s.toabolt.at/408F1196AF7A8BEE

http://xzjvzkgjxebzreap.onion/408F1196AF7A8BEE

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\00442a088456ce18a43187605557b3d1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00442a088456ce18a43187605557b3d1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Roaming\wsmprovhost.exe
      C:\Users\Admin\AppData\Roaming\wsmprovhost.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2504
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2884
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\00442A~1.EXE >> NUL
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2908
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\{RecOveR}-houjp__.Htm

    Filesize

    9KB

    MD5

    73f1f86704519f3d9bfd6a60b1195135

    SHA1

    df2bcf9842dca033ea89ca38f30458a1757f16a5

    SHA256

    878e027c490e233a2d81f01f5fd406339dc9b9dd8bea927b45c2e389246fc8dd

    SHA512

    5cc352f132678d0968f5528cee277163c75845fd85c53eacad4f50338a350dc1ebd1ee181238d1d377d558faf6060519140a08603d997152fd04af84c8b490fa

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\{RecOveR}-houjp__.Png

    Filesize

    95KB

    MD5

    a7faa0f02bdfb492db172bb40b401431

    SHA1

    8ee07b4483015f25190997fbb509b6de897289ec

    SHA256

    82d3ff63a3d980dac39bc0e2942e669214240d926f4f00a290460a8d04c98b2c

    SHA512

    beda85ebc5735320024ee494bdbbcfd788cd0ea8b7223c1a5d5c521af91cc5999137e071f7fbb32b882de5860ea923d4dec8745db42ca99a37b528756f51fc6f

  • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\{RecOveR}-houjp__.Txt

    Filesize

    2KB

    MD5

    ab4ef43dab420df4ea32ae06c80d0354

    SHA1

    274c7680511bb9f904b2e48cc05568df6738106b

    SHA256

    4d4aa9b205966e9456f677e1e21627806475fc0f24bfa6519afc2b70cb5dd87e

    SHA512

    bfca3e6fcaac6cad103e01e4b6f2fe93320f370a7f11f6aad419438a91778b537f9acf6bca84c3392d73ccddb838398a69b62c813fa84b3cd769bebf3c3a2e79

  • C:\Users\Admin\AppData\Local\Temp\CabDF1B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDF8B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\sources\license\es-es\eval\ultimate\license.rtf

    Filesize

    35KB

    MD5

    13beb8fa053d18f2a40faa30a1817fb8

    SHA1

    b5a9a419be04a75f94f5e7d9361f05433ac7c9af

    SHA256

    f81a02bac45c57b0b084e21f31393bebf6d77d85c3d40cd23a8bc881bb4e1e1f

    SHA512

    1e6565740a158a5e6b9518ec6a43f5bd780ef2b1ed6805a1ee3cd6bf338422ee5c07762c891b4f78ee4d1096c5b82eeebeb6261e7f120500954650ec19ac5036

  • C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\sp1\sources\license\es-es\eval\homepremiume\license.rtf

    Filesize

    28KB

    MD5

    593d298b498ff2ba12ca3f9a5dd186e4

    SHA1

    c99b2f76625e6c3730f2a409c43f11507b1ff358

    SHA256

    553695d412ac38875d4210f7a360798dd06ad3220d8ed5971889f919bfca503c

    SHA512

    d0d446ed1b819da8f1509dd66241fc91c340838f8c342f85ec4cb0e644b9aa6fe238757f399d16ef9bbee32a13c640af6c85dbea75f93da2f0262428ada18969

  • C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\sp1\sources\license\es-es\eval\startere\license.rtf

    Filesize

    28KB

    MD5

    c30fadbe1165ea07e36b308fd6282637

    SHA1

    ed46636a45d7e82c76383f78bfd8f4ae5235bbdc

    SHA256

    be93a9f119086438c5b79fb254f6a699dccae4fa3d4fa773b6e23bfcfa849772

    SHA512

    b73316f72e26a8b49d7a9f2e98f9bcdd0f129ae2da5e3aaf9c06de1e54eee8e8863ec253f7cc77ecf6a5cf8120fb98cb93bf4496e54510db0384a8f5c8f4188e

  • C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\sp1\sources\license\es-es\eval\startern\license.rtf

    Filesize

    35KB

    MD5

    32648bce3ed0427fdc1ea0180b600078

    SHA1

    8a251c54ab92be73dc5fdc567426953ed58fcb1d

    SHA256

    a1f6710b896070923b232616f5b2feecda166e1408af14647ce6efd6651482ab

    SHA512

    e32f37d3430f8b168c13d7ca9bace6d73e70959be579ce4b5528fdd6aa7a81036978023a5214c83e4ff995c24ac6c830cb6571b184850f251ac63482f64a38ea

  • \Users\Admin\AppData\Roaming\wsmprovhost.exe

    Filesize

    344KB

    MD5

    00442a088456ce18a43187605557b3d1

    SHA1

    d02f19accf695508bc31a650539934d8ea46fb15

    SHA256

    d8ee200589d8e7d72878ea79bcfc9d18ee52569c046df74fa0dfe7e33d9ec422

    SHA512

    62d65da6e38ceae67845d44fe979941049d54075ca16ff0ed6b6db3379ccc30df55da5a4a2926e52147a48f0c11c2283fc1ee06864e8605bf31fb77b766656a7

  • memory/2504-676-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-7376-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-1382-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-2192-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-3010-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-3856-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-4747-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-14-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-11331-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-487-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-10302-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-9390-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2504-8371-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2984-13-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2984-1-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB

  • memory/2984-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB