General
-
Target
3f94abbd4364ef5f17dac6211b4e67f2_JaffaCakes118
-
Size
693KB
-
Sample
241013-nkn33syfjl
-
MD5
3f94abbd4364ef5f17dac6211b4e67f2
-
SHA1
9e8a22912a23c6efa358f20d6e86cc6b77634c74
-
SHA256
f681f08b89b710b8d32d08a6569629a6403459aa5256cc68e0e3d2b86934a221
-
SHA512
a0d973bb1a4b4f816bc22851d6a8ac7f578cdbe67cddec39aec6e6639cd4484b80b58642f9b9821970cbf4bf221c43a38388260dd93c3566406d80cd01f39360
-
SSDEEP
12288:2yi5zcMZ13XNEK5s37Hs7bOnCxrKzptvC0bNr/BWoo0PaAhyt/imgc0fYAChCJmr:2yi5zpZZWqs37HsGC8BRZWLWa6UisMrY
Static task
static1
Behavioral task
behavioral1
Sample
Factuur 00078454556-00398583.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Factuur 00078454556-00398583.pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\ProgramData\axwcwrc.html
http://tmc2ybfqzgkaeilm.onion.cab
http://tmc2ybfqzgkaeilm.tor2web.org
http://tmc2ybfqzgkaeilm.onion
Targets
-
-
Target
Factuur 00078454556-00398583.pdf.exe
-
Size
760KB
-
MD5
73b5b2675d4391fe6c59cc596bcd2a04
-
SHA1
4a598519786f3646d459ede621337e08d67c1b3f
-
SHA256
34400196b5de7adde8de4f2d8a5aadd350d1ce06910b9d44c1a17969c42b1b69
-
SHA512
9b0f5bf43ae7b001a40f9d2742c2558e6961e3058bd67ec92108cbe75dc088ec3cbc8afeb3bd88bb0d9042db36b66cc1cff1054235fdb3ae4d1b659f0e86114f
-
SSDEEP
12288:BDcMXv3/NEK7s37/shbOnMxrUzbtvC0nNr/Bqoo0Pamhyx/iugcGfAAChCJeTlV3:VpX/uqs37/s4MKrRZqLWaE6iUSDX2b
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-