General
-
Target
3aecd251d296551ec8827008796244e5_JaffaCakes118
-
Size
16KB
-
Sample
241013-w6x7wa1epa
-
MD5
3aecd251d296551ec8827008796244e5
-
SHA1
2b225bcd484f71b14e3c4792cb0c5965b26a830a
-
SHA256
9be38b91de4c97f277b1cf221e8a3e8b95141e617e82cfdd5341faba775dcfba
-
SHA512
ac2a5f2ab6173145e02c07e52a423a674ca9a1da309c3027e52dcd1c0302186f0d1d124c6d89302f011bd945dbd1f92b0e44a9bb7d2ccf081f7a58859f9fc975
-
SSDEEP
384:cprr1gkDCgSLY19Iigbbjt7l7l7lljjpeyLLs4LD/B:SrVDC7YsizU
Behavioral task
behavioral1
Sample
3aecd251d296551ec8827008796244e5_JaffaCakes118.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
3aecd251d296551ec8827008796244e5_JaffaCakes118
-
Size
16KB
-
MD5
3aecd251d296551ec8827008796244e5
-
SHA1
2b225bcd484f71b14e3c4792cb0c5965b26a830a
-
SHA256
9be38b91de4c97f277b1cf221e8a3e8b95141e617e82cfdd5341faba775dcfba
-
SHA512
ac2a5f2ab6173145e02c07e52a423a674ca9a1da309c3027e52dcd1c0302186f0d1d124c6d89302f011bd945dbd1f92b0e44a9bb7d2ccf081f7a58859f9fc975
-
SSDEEP
384:cprr1gkDCgSLY19Iigbbjt7l7l7lljjpeyLLs4LD/B:SrVDC7YsizU
-
Detected Xorist Ransomware
-
Renames multiple (6341) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Drops startup file
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1