General
-
Target
9ea29e24749452c4b1441c6d78c06e97_JaffaCakes118
-
Size
355KB
-
Sample
241125-3xahsazldj
-
MD5
9ea29e24749452c4b1441c6d78c06e97
-
SHA1
29a7b7e56a1f0631d074d0c42d865080264dfe39
-
SHA256
71d73684c8b2f3ee1e5796b141b917d98db8cb4b6d2e39eaeb74361a01605016
-
SHA512
ec459cabcd49d8d31931cbbc56c0bd59244579d862100833cfb1a7c39a42bc5cc82f3ad895e03357f2fb688d970dab23c00f54563437e2a52fcb2e6c1e1257fe
-
SSDEEP
6144:Owfkl5RcNIoyF1Y8OjIIrT9lI73GUL9miFigaH+3skE+I/sjWNDiya0ZcHVF3sII:Owfkl8WoyU8dIjML6X+8kE6W9a0ZQVJ+
Static task
static1
Behavioral task
behavioral1
Sample
9ea29e24749452c4b1441c6d78c06e97_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ea29e24749452c4b1441c6d78c06e97_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\how_recover+vhy.txt
http://k5fxm4dl35qk323d.justmakeapayment.com/9FA6FF49921F92CD
http://phfnchd6d3frwe84.brsoftpayment.com/9FA6FF49921F92CD
http://tsbfdsv.extr6mchf.com/9FA6FF49921F92CD
https://o7zeip6us33igmgw.onion.to/9FA6FF49921F92CD
https://o7zeip6us33igmgw.tor2web.org/9FA6FF49921F92CD
https://o7zeip6us33igmgw.onion.cab/9FA6FF49921F92CD
http://o7zeip6us33igmgw.onion/9FA6FF49921F92CD
Targets
-
-
Target
9ea29e24749452c4b1441c6d78c06e97_JaffaCakes118
-
Size
355KB
-
MD5
9ea29e24749452c4b1441c6d78c06e97
-
SHA1
29a7b7e56a1f0631d074d0c42d865080264dfe39
-
SHA256
71d73684c8b2f3ee1e5796b141b917d98db8cb4b6d2e39eaeb74361a01605016
-
SHA512
ec459cabcd49d8d31931cbbc56c0bd59244579d862100833cfb1a7c39a42bc5cc82f3ad895e03357f2fb688d970dab23c00f54563437e2a52fcb2e6c1e1257fe
-
SSDEEP
6144:Owfkl5RcNIoyF1Y8OjIIrT9lI73GUL9miFigaH+3skE+I/sjWNDiya0ZcHVF3sII:Owfkl8WoyU8dIjML6X+8kE6W9a0ZQVJ+
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (414) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1