General
-
Target
57b2a1db98a792e2498b6ba5344deb90_JaffaCakes118
-
Size
344KB
-
Sample
241018-qrhkzs1hrn
-
MD5
57b2a1db98a792e2498b6ba5344deb90
-
SHA1
b8a75d237c860f0128eae5adeb7e76f41233fc36
-
SHA256
6950d9f5794147161a7628aedcea38671ee33148580e015cf973f6a86c158d15
-
SHA512
36ebdbc0b27025e9bcc0edbe0cb9b40f2f4f4bbc1582d8e94e42d399a474d45227789d158b7d991fd04424188429fbc00fcf9db06922e3e8abf1506c4aa6d729
-
SSDEEP
6144:FqvsZf39vcCN1RHCfsIltPv6qn0/+sK+x20Im5iTxSO+xUJ:FqIv/wTPv6Q0GwFPxU
Static task
static1
Behavioral task
behavioral1
Sample
57b2a1db98a792e2498b6ba5344deb90_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
57b2a1db98a792e2498b6ba5344deb90_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+iarvw.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/9D491D6452BEFF71
http://tes543berda73i48fsdfsd.keratadze.at/9D491D6452BEFF71
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9D491D6452BEFF71
http://xlowfznrg4wf7dli.ONION/9D491D6452BEFF71
Extracted
C:\Program Files\7-Zip\Lang\Recovery+efwpl.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/203E6626954748B
http://tes543berda73i48fsdfsd.keratadze.at/203E6626954748B
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/203E6626954748B
http://xlowfznrg4wf7dli.ONION/203E6626954748B
Targets
-
-
Target
57b2a1db98a792e2498b6ba5344deb90_JaffaCakes118
-
Size
344KB
-
MD5
57b2a1db98a792e2498b6ba5344deb90
-
SHA1
b8a75d237c860f0128eae5adeb7e76f41233fc36
-
SHA256
6950d9f5794147161a7628aedcea38671ee33148580e015cf973f6a86c158d15
-
SHA512
36ebdbc0b27025e9bcc0edbe0cb9b40f2f4f4bbc1582d8e94e42d399a474d45227789d158b7d991fd04424188429fbc00fcf9db06922e3e8abf1506c4aa6d729
-
SSDEEP
6144:FqvsZf39vcCN1RHCfsIltPv6qn0/+sK+x20Im5iTxSO+xUJ:FqIv/wTPv6Q0GwFPxU
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (420) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1