General
-
Target
6d83d702fad47bf24a04c4b3e2c9d930_JaffaCakes118
-
Size
714KB
-
Sample
241023-hbbhqswbpd
-
MD5
6d83d702fad47bf24a04c4b3e2c9d930
-
SHA1
e706a46e3bbb821e8f4aec1f3e488be1504b855b
-
SHA256
8c5385fccd9d705cca3f3e85227db53c67cfe19ae5460b4335bcf39a32c9ff07
-
SHA512
62cda9516333dfe92d4099f2cc25d8e434ac23abc28dbd522695b200a4a1545473a6a419bd9ac8fadb54283980a82f37d1faa2ab32df92a9d10e74750c58499d
-
SSDEEP
12288:mSuYrHkpL3KyptgMzPez1OkvHj3CfL0PzGJRZLB3LE:X1kpL3KyAWPez1fD3mLIzGvZt3LE
Static task
static1
Behavioral task
behavioral1
Sample
6d83d702fad47bf24a04c4b3e2c9d930_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6d83d702fad47bf24a04c4b3e2c9d930_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\ProgramData\ilimarf.html
http://43qzvceo6ondd6wt.onion.cab
http://43qzvceo6ondd6wt.tor2web.org
http://43qzvceo6ondd6wt.onion
Targets
-
-
Target
6d83d702fad47bf24a04c4b3e2c9d930_JaffaCakes118
-
Size
714KB
-
MD5
6d83d702fad47bf24a04c4b3e2c9d930
-
SHA1
e706a46e3bbb821e8f4aec1f3e488be1504b855b
-
SHA256
8c5385fccd9d705cca3f3e85227db53c67cfe19ae5460b4335bcf39a32c9ff07
-
SHA512
62cda9516333dfe92d4099f2cc25d8e434ac23abc28dbd522695b200a4a1545473a6a419bd9ac8fadb54283980a82f37d1faa2ab32df92a9d10e74750c58499d
-
SSDEEP
12288:mSuYrHkpL3KyptgMzPez1OkvHj3CfL0PzGJRZLB3LE:X1kpL3KyAWPez1fD3mLIzGvZt3LE
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-