General
-
Target
8002e12ee374b2cb136757a46116244b_JaffaCakes118
-
Size
742KB
-
Sample
241030-vdpvcsxhlp
-
MD5
8002e12ee374b2cb136757a46116244b
-
SHA1
08afb20b09ebbeb30939389edc7e53b6f4c1fc57
-
SHA256
feb609be0898e8da070811eb70ec98de0d64e9d28d5eebec7e75088c6159218f
-
SHA512
0a58b3deb7dc752c407024c2644d6f237b21d3a9a61317cfc64db69f0371e4d75a4a5527c4146374a006e9792c487ba051018beb76aa5e6e1257d3dc7cb3eab1
-
SSDEEP
12288:494e4oMww1bLO6ejFn8KL8XdChu/FiMZgi7hLEsOYt4ZmwjHCmac95RDOqruN2mE:hes126wFn8KL8tz4MZHVLJtimSimHROY
Static task
static1
Behavioral task
behavioral1
Sample
8002e12ee374b2cb136757a46116244b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8002e12ee374b2cb136757a46116244b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\ProgramData\pypafpb.html
http://fizxfsi3cad3kn7v.onion.cab
http://fizxfsi3cad3kn7v.tor2web.org
http://fizxfsi3cad3kn7v.onion
Targets
-
-
Target
8002e12ee374b2cb136757a46116244b_JaffaCakes118
-
Size
742KB
-
MD5
8002e12ee374b2cb136757a46116244b
-
SHA1
08afb20b09ebbeb30939389edc7e53b6f4c1fc57
-
SHA256
feb609be0898e8da070811eb70ec98de0d64e9d28d5eebec7e75088c6159218f
-
SHA512
0a58b3deb7dc752c407024c2644d6f237b21d3a9a61317cfc64db69f0371e4d75a4a5527c4146374a006e9792c487ba051018beb76aa5e6e1257d3dc7cb3eab1
-
SSDEEP
12288:494e4oMww1bLO6ejFn8KL8XdChu/FiMZgi7hLEsOYt4ZmwjHCmac95RDOqruN2mE:hes126wFn8KL8tz4MZHVLJtimSimHROY
-
Ctblocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-