General
-
Target
99ac20481d26bbdb5e5e990b470d5e43_JaffaCakes118
-
Size
754KB
-
Sample
241125-gve5laylhj
-
MD5
99ac20481d26bbdb5e5e990b470d5e43
-
SHA1
37a12949d6147b33e48d6ae7bb95c8adc502781e
-
SHA256
04a1c752bb88e842acdf2b0b05f47d9909f5d871b0631da59020ff71532e51d9
-
SHA512
192695662fabb4aa2a45d53fc457a34582541e3ea308d7e896c7b5c4a185030aad07c4a25d2be34bbb4b70c1b58e94ca1e7b4a4a11f26c5923a8a7ac829f6f05
-
SSDEEP
768:2n+CJMZ07MwvFmmELPZjE+RDUIsN+LpkSC34NPBkhLQ+:bCJMZ0IwvFm/PBEwDU5QmmPd
Static task
static1
Behavioral task
behavioral1
Sample
99ac20481d26bbdb5e5e990b470d5e43_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
99ac20481d26bbdb5e5e990b470d5e43_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
99ac20481d26bbdb5e5e990b470d5e43_JaffaCakes118
-
Size
754KB
-
MD5
99ac20481d26bbdb5e5e990b470d5e43
-
SHA1
37a12949d6147b33e48d6ae7bb95c8adc502781e
-
SHA256
04a1c752bb88e842acdf2b0b05f47d9909f5d871b0631da59020ff71532e51d9
-
SHA512
192695662fabb4aa2a45d53fc457a34582541e3ea308d7e896c7b5c4a185030aad07c4a25d2be34bbb4b70c1b58e94ca1e7b4a4a11f26c5923a8a7ac829f6f05
-
SSDEEP
768:2n+CJMZ07MwvFmmELPZjE+RDUIsN+LpkSC34NPBkhLQ+:bCJMZ0IwvFm/PBEwDU5QmmPd
-
Detected Xorist Ransomware
-
Xorist family
-
Renames multiple (2217) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1