General
-
Target
070fdbaad7e06bcf0b0807ff9b8671a6_JaffaCakes118
-
Size
240KB
-
Sample
241001-xx6nbszckf
-
MD5
070fdbaad7e06bcf0b0807ff9b8671a6
-
SHA1
c2f278a572d0f00b51bdb5645de5afa5945b17df
-
SHA256
a15b09f8c76042a9b163c36d03135b35465d2541d351327da9974bb2165aef01
-
SHA512
8742b153501800b4b8ed5d9ff6f0844afa5f3983a436ab01460d82b7ccaa8724d782fb56f6f7336504f1f2f981a068a94552abdd8c5d946f6fa630254f7b8581
-
SSDEEP
3072:95wXqvbnDOwwHYFrBNH84Fz1F5KEnd7DeAZEimROoJV8OhaHHnGBrIvwkYhroBXR:95b/XK2tXlD8JanUrsgpo1xHwHzr
Static task
static1
Behavioral task
behavioral1
Sample
070fdbaad7e06bcf0b0807ff9b8671a6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
070fdbaad7e06bcf0b0807ff9b8671a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\restore_files_blxmo.html
Extracted
C:\Program Files\7-Zip\Lang\restore_files_blxmo.txt
https://zpr5huq4bgmutfnf.onion.to/CC30DBDCE497425F
http://zpr5huq4bgmutfnf.onion/CC30DBDCE497425F
http://aep554w4fm8j.fflroe598qu.com/CC30DBDCE497425F
Targets
-
-
Target
070fdbaad7e06bcf0b0807ff9b8671a6_JaffaCakes118
-
Size
240KB
-
MD5
070fdbaad7e06bcf0b0807ff9b8671a6
-
SHA1
c2f278a572d0f00b51bdb5645de5afa5945b17df
-
SHA256
a15b09f8c76042a9b163c36d03135b35465d2541d351327da9974bb2165aef01
-
SHA512
8742b153501800b4b8ed5d9ff6f0844afa5f3983a436ab01460d82b7ccaa8724d782fb56f6f7336504f1f2f981a068a94552abdd8c5d946f6fa630254f7b8581
-
SSDEEP
3072:95wXqvbnDOwwHYFrBNH84Fz1F5KEnd7DeAZEimROoJV8OhaHHnGBrIvwkYhroBXR:95b/XK2tXlD8JanUrsgpo1xHwHzr
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (888) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1