Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6521f113d1087cab8fae09a384994dc9_JaffaCakes118

  • Size

    356KB

  • Sample

    241021-b8lawasfkc

  • MD5

    6521f113d1087cab8fae09a384994dc9

  • SHA1

    33a69cefcb6c699e15c7761501341c2b37c8f76b

  • SHA256

    68134bc5a946b5d3b0a13151bf6c98b7980336a8bd0668c082c21405af80dc00

  • SHA512

    d852bdb68d0b500df4a4916a16713c649375e346a89886ed70ca71942b503c2bac41201b43fc60500aa9b0258f4054337fe0e3688bb3512c273e8a439ba88e28

  • SSDEEP

    6144:D5KfGcaskPkRYkszNGfpMaapkcHvXj6h+sHtCFKxiroHcCzVmgL/CmEM2yXeJ7MN:DEfGcAgDqoazpTHeh+sHtC9yoItmE

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\+-HELP-RECOVER-+nipto-+.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA4096:https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? It means that on a structural level your files have been transformed. You won't be able to use, read, see or work with them anymore. In other words they are useless, however, there is a possibility to restore them with our help. What exactly happened to your files? *** Two personal RSA4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key, which you received over the web. *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. What should you do next? There are several options for you to consider: 1. You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or 2. You can start getting BitCoins right now and get access to your data quite fast. In case you have valuable files, we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions, please access your personal homepage by choosing one of the few addresses down below: http://vewrb.italisumo.at/D89BE53E1CCD74 http://gwbak.nickymaru.com/D89BE53E1CCD74 http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/D89BE53E1CCD74 If you can't access your personal homepage or the addresses are not working, complete the following steps: 1 Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en 2 Install TOR Browser 3 Open TOR Browser 4 Insert the following link in the address bar: k7tlx3ghr3m4n2tu.onion/D89BE53E1CCD74 5 Follow instructions on your screen !!! IMPORTANT INFORMATION Your personal homepages: http://vewrb.italisumo.at/D89BE53E1CCD74 http://gwbak.nickymaru.com/D89BE53E1CCD74 http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/D89BE53E1CCD74 Your personal page Tor-Browser k7tlx3ghr3m4n2tu.onion/D89BE53E1CCD74 Your personal identification ID: D89BE53E1CCD74
URLs

http://vewrb.italisumo.at/D89BE53E1CCD74

http://gwbak.nickymaru.com/D89BE53E1CCD74

http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/D89BE53E1CCD74

http://k7tlx3ghr3m4n2tu.onion/D89BE53E1CCD74

Extracted

Path

C:\Program Files\7-Zip\Lang\+-HELP-RECOVER-+qmdop-+.txt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What's the matter with your files? Your data was secured using a strong encryption with RSA4096. Use the link down below to find additional information on the encryption keys using RSA4096:https://en.wikipedia.org/wiki/RSA_(cryptosystem) What exactly that means? It means that on a structural level your files have been transformed. You won't be able to use, read, see or work with them anymore. In other words they are useless, however, there is a possibility to restore them with our help. What exactly happened to your files? *** Two personal RSA4096 keys were generated for your PC/Laptop; one key is public, another key is private. *** All your data and files were encrypted by the means of the public key, which you received over the web. *** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers. What should you do next? There are several options for you to consider: 1. You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or 2. You can start getting BitCoins right now and get access to your data quite fast. In case you have valuable files, we advise you to act fast as there is no other option rather than paying in order to get back your data. In order to obtain specific instructions, please access your personal homepage by choosing one of the few addresses down below: http://vewrb.italisumo.at/67A2C1CD43BD6FE http://gwbak.nickymaru.com/67A2C1CD43BD6FE http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/67A2C1CD43BD6FE If you can't access your personal homepage or the addresses are not working, complete the following steps: 1 Download TOR Browser - http://www.torproject.org/projects/torbrowser.html.en 2 Install TOR Browser 3 Open TOR Browser 4 Insert the following link in the address bar: k7tlx3ghr3m4n2tu.onion/67A2C1CD43BD6FE 5 Follow instructions on your screen !!! IMPORTANT INFORMATION Your personal homepages: http://vewrb.italisumo.at/67A2C1CD43BD6FE http://gwbak.nickymaru.com/67A2C1CD43BD6FE http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/67A2C1CD43BD6FE Your personal page Tor-Browser k7tlx3ghr3m4n2tu.onion/67A2C1CD43BD6FE Your personal identification ID: 67A2C1CD43BD6FE
URLs

http://vewrb.italisumo.at/67A2C1CD43BD6FE

http://gwbak.nickymaru.com/67A2C1CD43BD6FE

http://irudhkunrlfu25fhkaqw34blr5qlby4tgq43t.orrisbirth.com/67A2C1CD43BD6FE

http://k7tlx3ghr3m4n2tu.onion/67A2C1CD43BD6FE

Targets

    • Target

      6521f113d1087cab8fae09a384994dc9_JaffaCakes118

    • Size

      356KB

    • MD5

      6521f113d1087cab8fae09a384994dc9

    • SHA1

      33a69cefcb6c699e15c7761501341c2b37c8f76b

    • SHA256

      68134bc5a946b5d3b0a13151bf6c98b7980336a8bd0668c082c21405af80dc00

    • SHA512

      d852bdb68d0b500df4a4916a16713c649375e346a89886ed70ca71942b503c2bac41201b43fc60500aa9b0258f4054337fe0e3688bb3512c273e8a439ba88e28

    • SSDEEP

      6144:D5KfGcaskPkRYkszNGfpMaapkcHvXj6h+sHtCFKxiroHcCzVmgL/CmEM2yXeJ7MN:DEfGcAgDqoazpTHeh+sHtC9yoItmE

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks