Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 11:25

General

  • Target

    39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe

  • Size

    742KB

  • MD5

    39c0e005cd2892a7b315081f9db6dc37

  • SHA1

    e9c2dda548ca0f53939d8bbf9228a92977964341

  • SHA256

    9005436ea8f7c0dede260d1b249540c94a02431afe4d26956b4199705577ea62

  • SHA512

    e5b258b62685152ba0387a280a27957c6cd78848d31a7cd65089c0c8dbd0d59d65089f702fe0dd8e759a27c2974219f9c170ba67c6457a4725a8b09dc69ce77e

  • SSDEEP

    12288:T2359uMww1bLO6ejFn8KL8XdChu/FiMZgi7hLEsOYt4ZmwjHCmac95RDOqruN2mE:S5p126wFn8KL8tz4MZHVLJtimSimHROY

Malware Config

Extracted

Path

C:\ProgramData\xzhmwel.html

Ransom Note
Your documents, photos, databases and other important files have been encrypted with strongest encryption and unique key, generated for this computer. Private decryption key is stored on a secret Internet server and nobody can decrypt your files until you pay and obtain the private key. If you see the main locker window, follow the instructions on the locker. Overwise, it's seems that you or your antivirus deleted the locker program. Now you have the last chance to decrypt your files. Open http://fizxfsi3cad3kn7v.onion.cab or http://fizxfsi3cad3kn7v.tor2web.org in your browser. They are public gates to the secret server. If you have problems with gates, use direct connection: 1. Download Tor Browser from http://torproject.org. 2. In the Tor Browser open the http://fizxfsi3cad3kn7v.onion Note that this server is available via Tor Browser only. Retry in 1 hour if site is not reachable. Copy and paste the following public key in the input form on server. Avoid missprints. Follow the instructions on the server. The list of your encrypted files: Path File
URLs

http://fizxfsi3cad3kn7v.onion.cab

http://fizxfsi3cad3kn7v.tor2web.org

http://fizxfsi3cad3kn7v.onion

Signatures

  • CTB-Locker

    Ransomware family which uses Tor to hide its C2 communications.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 23 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
      2⤵
        PID:2020
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Sets desktop wallpaper using registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\39c0e005cd2892a7b315081f9db6dc37_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2980
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {AD2E7BB7-8969-48AE-BAD1-82D3A9E13FB4} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe
        C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2520
        • C:\Windows\SysWOW64\vssadmin.exe
          vssadmin delete shadows all
          3⤵
          • System Location Discovery: System Language Discovery
          • Interacts with shadow copies
          PID:2336
        • C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe
          "C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe" -u
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Adobe\cymblee

      Filesize

      654B

      MD5

      1205126e91eabfc41d301a25c5b2892c

      SHA1

      94173996ac7fa998088d48faa7a1d149963c95eb

      SHA256

      dd404097310d56b0c614e4643d6ad90531bc842062e7106f623de1f4129d0b2f

      SHA512

      74cd71573628256ac55920d7327e8f5931e1a72794add0ffe3b91f9d1d3f862e1da16fc865647d874238b0d13bda97790ea0a5cea6ce76f836b58aefad8755d1

    • C:\ProgramData\Adobe\cymblee

      Filesize

      654B

      MD5

      f0492c61b213c0506c0b58db47526f39

      SHA1

      c04e74a6e0a26c659152c8400a049ddd89a473b6

      SHA256

      4ca08aaa1661103f70b1e5ae274f778a9d6d3f34a37d9f145ed4104e8df84b36

      SHA512

      2213cb2afe15739247e63b2eea9e8600f55a7006c75320de92029f0de780fec77251b150f8743d4e795e6f66da3e737b47035114a36ca80e54e65dcec437d97c

    • C:\ProgramData\Adobe\cymblee

      Filesize

      654B

      MD5

      7f79d7d3cdef0b85b8f4853efc624bf8

      SHA1

      c61c89d7ee5f4673154010edc3888097ea8135dc

      SHA256

      2bdc19eaa9cfe4be5fddc684155f61111ef6dfc8cb4735a2eb6217fe6b078c24

      SHA512

      8a6172b09306e9e28aa0757cb6e22725e21476f4c93e7e16adf9e9baf63aaabc3472d3eb2dccf06a76112d1e05bc3e1d99320080977f3cd8fc083785ac99e6c3

    • C:\ProgramData\xzhmwel.html

      Filesize

      63KB

      MD5

      c82f54419c62e1897e086193d4437662

      SHA1

      af1177e52d0d96860ce11a50602f81a03ce43346

      SHA256

      0a2b37a21a925ba0db30b5f748968a1fa5574b650bff5f097d64ed39ceee742a

      SHA512

      99794c0391b6f46a926358972a653c91a79cd2805e16a7693506e8c78871828ee05b48692c8d14a86c7a8326432da3300c778940b745710158a23a293be74156

    • C:\Users\Admin\AppData\Local\Temp\qrzxbjl.exe

      Filesize

      742KB

      MD5

      39c0e005cd2892a7b315081f9db6dc37

      SHA1

      e9c2dda548ca0f53939d8bbf9228a92977964341

      SHA256

      9005436ea8f7c0dede260d1b249540c94a02431afe4d26956b4199705577ea62

      SHA512

      e5b258b62685152ba0387a280a27957c6cd78848d31a7cd65089c0c8dbd0d59d65089f702fe0dd8e759a27c2974219f9c170ba67c6457a4725a8b09dc69ce77e

    • memory/616-13-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-1254-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-39-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-14-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-17-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-20-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-27-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-16-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-22-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/616-24-0x0000000000160000-0x00000000001D7000-memory.dmp

      Filesize

      476KB

    • memory/2520-10-0x00000000014C0000-0x000000000170B000-memory.dmp

      Filesize

      2.3MB

    • memory/2520-1277-0x00000000014C0000-0x000000000170B000-memory.dmp

      Filesize

      2.3MB

    • memory/2520-1266-0x00000000014C0000-0x000000000170B000-memory.dmp

      Filesize

      2.3MB

    • memory/2644-1282-0x00000000026F0000-0x000000000293B000-memory.dmp

      Filesize

      2.3MB

    • memory/2644-1281-0x00000000026F0000-0x000000000293B000-memory.dmp

      Filesize

      2.3MB

    • memory/2644-1306-0x00000000026F0000-0x000000000293B000-memory.dmp

      Filesize

      2.3MB

    • memory/2644-1307-0x00000000026F0000-0x000000000293B000-memory.dmp

      Filesize

      2.3MB

    • memory/2644-1309-0x00000000026F0000-0x000000000293B000-memory.dmp

      Filesize

      2.3MB

    • memory/2644-1317-0x00000000026F0000-0x000000000293B000-memory.dmp

      Filesize

      2.3MB

    • memory/2980-3-0x0000000002600000-0x000000000281A000-memory.dmp

      Filesize

      2.1MB

    • memory/2980-1250-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2980-2-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2980-0-0x00000000002D0000-0x00000000002D1000-memory.dmp

      Filesize

      4KB

    • memory/2980-4-0x0000000002820000-0x0000000002A6B000-memory.dmp

      Filesize

      2.3MB

    • memory/2980-1-0x00000000002F0000-0x00000000002F1000-memory.dmp

      Filesize

      4KB