General
-
Target
ceaaeb1712019d430836876402e557e0_JaffaCakes118
-
Size
714KB
-
Sample
241206-yatwpatkg1
-
MD5
ceaaeb1712019d430836876402e557e0
-
SHA1
2ab07d22fd77078e77aa3a635ad9d16f7b6a7fb1
-
SHA256
7ab006f651a322f3e0a931b4c996ab6a0376848fcf2b105aa60ad1f0509cf11e
-
SHA512
4923abc558f63f1c995592c08071fafbc7d6bdc9d45ad6ab1039bf929a5a4cb1396aaff1d334ecf8f27b1f6bdb313bf7f40996acb3bd6b2d86a9ca91d8bc7b4c
-
SSDEEP
12288:bE21sNQUTjzo7nFcC6V0Wu+vvg7yXru6O55IENgC2QUT0uDYyuXdNfkd9R4au:JsNnD6evI7yb7MIabC0uh4dJQe
Static task
static1
Behavioral task
behavioral1
Sample
ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ceaaeb1712019d430836876402e557e0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\ProgramData\ilimarf.html
http://43qzvceo6ondd6wt.onion.cab
http://43qzvceo6ondd6wt.tor2web.org
http://43qzvceo6ondd6wt.onion
Targets
-
-
Target
ceaaeb1712019d430836876402e557e0_JaffaCakes118
-
Size
714KB
-
MD5
ceaaeb1712019d430836876402e557e0
-
SHA1
2ab07d22fd77078e77aa3a635ad9d16f7b6a7fb1
-
SHA256
7ab006f651a322f3e0a931b4c996ab6a0376848fcf2b105aa60ad1f0509cf11e
-
SHA512
4923abc558f63f1c995592c08071fafbc7d6bdc9d45ad6ab1039bf929a5a4cb1396aaff1d334ecf8f27b1f6bdb313bf7f40996acb3bd6b2d86a9ca91d8bc7b4c
-
SSDEEP
12288:bE21sNQUTjzo7nFcC6V0Wu+vvg7yXru6O55IENgC2QUT0uDYyuXdNfkd9R4au:JsNnD6evI7yb7MIabC0uh4dJQe
-
Ctblocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-