General
-
Target
41c9cf8f98d9cf11e0b101562876d404_JaffaCakes118
-
Size
424KB
-
Sample
241013-yn5kcavhkd
-
MD5
41c9cf8f98d9cf11e0b101562876d404
-
SHA1
88a88e498b8e4b73e8585e7994ed519b9ace9610
-
SHA256
bedd09abc5eb323220f26eadbe1ede76373ebd6d8a84fd2884429760b0cd197a
-
SHA512
78c028c126351716c5460f391d810d5925f9ad36eb3a506b0e3d015bcef9b2a0ed9c3fbec9c3f81a5dc362edf64de5eb377da070712ac720d9ea6350da5af113
-
SSDEEP
12288:wL2WjWgDhrhjxaRaDz7z4HMLzskGWoXblCJxfS6:wDXpVx7f7dLoMorOR1
Static task
static1
Behavioral task
behavioral1
Sample
41c9cf8f98d9cf11e0b101562876d404_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41c9cf8f98d9cf11e0b101562876d404_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_RECoVERY_+ogims.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/FFBDAB7536DEA9A5
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/FFBDAB7536DEA9A5
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/FFBDAB7536DEA9A5
http://xlowfznrg4wf7dli.ONION/FFBDAB7536DEA9A5
Extracted
C:\Program Files\7-Zip\Lang\_RECoVERY_+pxgak.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/625F3498D7DBD9C
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/625F3498D7DBD9C
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/625F3498D7DBD9C
http://xlowfznrg4wf7dli.ONION/625F3498D7DBD9C
Targets
-
-
Target
41c9cf8f98d9cf11e0b101562876d404_JaffaCakes118
-
Size
424KB
-
MD5
41c9cf8f98d9cf11e0b101562876d404
-
SHA1
88a88e498b8e4b73e8585e7994ed519b9ace9610
-
SHA256
bedd09abc5eb323220f26eadbe1ede76373ebd6d8a84fd2884429760b0cd197a
-
SHA512
78c028c126351716c5460f391d810d5925f9ad36eb3a506b0e3d015bcef9b2a0ed9c3fbec9c3f81a5dc362edf64de5eb377da070712ac720d9ea6350da5af113
-
SSDEEP
12288:wL2WjWgDhrhjxaRaDz7z4HMLzskGWoXblCJxfS6:wDXpVx7f7dLoMorOR1
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (417) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1