General
-
Target
3f4c5fe355ffe9030f6bfce23fe98e55_JaffaCakes118
-
Size
308KB
-
Sample
241013-mdrpys1fpd
-
MD5
3f4c5fe355ffe9030f6bfce23fe98e55
-
SHA1
e1391a7b978d0b44803118a0955221748b2bc9c0
-
SHA256
65f0013f4dc1c0c79266f6bb57de3d7d08457ff25c7eb31ffb728e1538620db5
-
SHA512
7ab1f051b47b189f094efb4838ee2a7b90d9da271b9a568789d1b28a764f693a45d5b8e1c1e2d74a02a41d8c7024447f30a1bdd81a3c391babb681a9d45911d1
-
SSDEEP
6144:cGkNyqgeuogtHpT5q0UAkrTswA4fMyxqnDYs6xbKy6gG:cGiyqhsJTqFrfA4fMysnMs2KT
Static task
static1
Behavioral task
behavioral1
Sample
3f4c5fe355ffe9030f6bfce23fe98e55_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f4c5fe355ffe9030f6bfce23fe98e55_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_jyjxp.txt
http://nasdki39dawk.oj998fh4txkjh.com/81F42A45F8E16A39
http://awoeinf832as.wo49i277rnw.com/81F42A45F8E16A39
https://zpr5huq4bgmutfnf.onion.to/81F42A45F8E16A39
http://zpr5huq4bgmutfnf.onion/81F42A45F8E16A39
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\restore_files_jyjxp.html
https://zpr5huq4bgmutfnf.onion.to/81F42A45F8E16A39</a>
Extracted
C:\Program Files\7-Zip\Lang\restore_files_eslwb.txt
http://nasdki39dawk.oj998fh4txkjh.com/38EE8CC34D61F4F3
http://awoeinf832as.wo49i277rnw.com/38EE8CC34D61F4F3
https://zpr5huq4bgmutfnf.onion.to/38EE8CC34D61F4F3
http://zpr5huq4bgmutfnf.onion/38EE8CC34D61F4F3
Extracted
C:\Program Files\7-Zip\Lang\restore_files_eslwb.html
https://zpr5huq4bgmutfnf.onion.to/38EE8CC34D61F4F3</a>
Targets
-
-
Target
3f4c5fe355ffe9030f6bfce23fe98e55_JaffaCakes118
-
Size
308KB
-
MD5
3f4c5fe355ffe9030f6bfce23fe98e55
-
SHA1
e1391a7b978d0b44803118a0955221748b2bc9c0
-
SHA256
65f0013f4dc1c0c79266f6bb57de3d7d08457ff25c7eb31ffb728e1538620db5
-
SHA512
7ab1f051b47b189f094efb4838ee2a7b90d9da271b9a568789d1b28a764f693a45d5b8e1c1e2d74a02a41d8c7024447f30a1bdd81a3c391babb681a9d45911d1
-
SSDEEP
6144:cGkNyqgeuogtHpT5q0UAkrTswA4fMyxqnDYs6xbKy6gG:cGiyqhsJTqFrfA4fMysnMs2KT
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (426) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1