General
-
Target
1367b5544d880a04248b3552c3232c3e_JaffaCakes118
-
Size
20KB
-
Sample
241004-px5f9syerd
-
MD5
1367b5544d880a04248b3552c3232c3e
-
SHA1
587c8acd42db7c7efe49242f4ec6fde0ec8e7aeb
-
SHA256
02878d52de142bdbeb5102ade3fe322bac4b2577f7cd316583e3ed18840965c5
-
SHA512
fc745fe43577959c7629bf5f530286ac74809ef70520334b4143787928eb6aa3c8a57ef18947b0346a2c26699bbb0c9905cf88abec4e7e839a69b2614fde9f73
-
SSDEEP
384:lQEBWKZqvIX/r3QtqM+VFc0H0SsdcCFNF2w3VX1Hz70TozIM4Utl8M0:lQr0qaMkV3reFH3nzUPM4w8
Static task
static1
Behavioral task
behavioral1
Sample
1367b5544d880a04248b3552c3232c3e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1367b5544d880a04248b3552c3232c3e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://107cc638c27ca6007cqbvpseec.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/qbvpseec
http://107cc638c27ca6007cqbvpseec.gosmark.space/qbvpseec
http://107cc638c27ca6007cqbvpseec.ourunit.xyz/qbvpseec
http://107cc638c27ca6007cqbvpseec.topsaid.site/qbvpseec
http://107cc638c27ca6007cqbvpseec.iecard.top/qbvpseec
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://f6d0ee70e658e6b000qbvpseec.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/qbvpseec
http://f6d0ee70e658e6b000qbvpseec.gosmark.space/qbvpseec
http://f6d0ee70e658e6b000qbvpseec.ourunit.xyz/qbvpseec
http://f6d0ee70e658e6b000qbvpseec.topsaid.site/qbvpseec
http://f6d0ee70e658e6b000qbvpseec.iecard.top/qbvpseec
Targets
-
-
Target
1367b5544d880a04248b3552c3232c3e_JaffaCakes118
-
Size
20KB
-
MD5
1367b5544d880a04248b3552c3232c3e
-
SHA1
587c8acd42db7c7efe49242f4ec6fde0ec8e7aeb
-
SHA256
02878d52de142bdbeb5102ade3fe322bac4b2577f7cd316583e3ed18840965c5
-
SHA512
fc745fe43577959c7629bf5f530286ac74809ef70520334b4143787928eb6aa3c8a57ef18947b0346a2c26699bbb0c9905cf88abec4e7e839a69b2614fde9f73
-
SSDEEP
384:lQEBWKZqvIX/r3QtqM+VFc0H0SsdcCFNF2w3VX1Hz70TozIM4Utl8M0:lQr0qaMkV3reFH3nzUPM4w8
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (74) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-