General
-
Target
aa74466c958e79e0f9a14147f3758659_JaffaCakes118
-
Size
157KB
-
Sample
241128-brwehsvpgk
-
MD5
aa74466c958e79e0f9a14147f3758659
-
SHA1
6a4463024660bfaf1c500213ee52c04c7599b8ab
-
SHA256
aeebbc1fedd0c64e0b65ec0a2746d35d91d33b3ce4fd8b77a321490226ff9aa2
-
SHA512
4e5eea738e894d6bfcfec82b50fbca29efc65463048376ccd7495738e9045f1a8df686a2a9271abfd0fb837c0a46a6483bd3fe587bd9e6d7ede3dae2ac83fc95
-
SSDEEP
3072:h0mldz9wxNd/zXJuV+c++LTVJdbUU4pRIFqBngIZArG9B1Reuno:h0mljK/zZuj+oP1wISGqVReuo
Static task
static1
Behavioral task
behavioral1
Sample
aa74466c958e79e0f9a14147f3758659_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aa74466c958e79e0f9a14147f3758659_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
aa74466c958e79e0f9a14147f3758659_JaffaCakes118
-
Size
157KB
-
MD5
aa74466c958e79e0f9a14147f3758659
-
SHA1
6a4463024660bfaf1c500213ee52c04c7599b8ab
-
SHA256
aeebbc1fedd0c64e0b65ec0a2746d35d91d33b3ce4fd8b77a321490226ff9aa2
-
SHA512
4e5eea738e894d6bfcfec82b50fbca29efc65463048376ccd7495738e9045f1a8df686a2a9271abfd0fb837c0a46a6483bd3fe587bd9e6d7ede3dae2ac83fc95
-
SSDEEP
3072:h0mldz9wxNd/zXJuV+c++LTVJdbUU4pRIFqBngIZArG9B1Reuno:h0mljK/zZuj+oP1wISGqVReuo
-
Detected Xorist Ransomware
-
Xorist family
-
Renames multiple (2214) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1