General
-
Target
d96103542ad88b7dd63633e1402d004d_JaffaCakes118
-
Size
368KB
-
Sample
241209-njgmlswkdw
-
MD5
d96103542ad88b7dd63633e1402d004d
-
SHA1
f139d0cdf959da734adb8218bb9ab1070589f0ba
-
SHA256
73da1b9b157a7d2ae3a21c90a114ca7251c32545511a38a3e92b777e59009c45
-
SHA512
c39095411c803ffe51d7adc67b5ac31897fad8914c3c09ea53fee4c3123ac3655dec98af425db093405b079a81aa97e2e5f6a2dc8061a5c812347d2a476753bb
-
SSDEEP
6144:oL9rKjvNvkH1sGf7L4JZ9oL+5b/OcGBJL8dxjHtgWECmCTPqsUPpII:5jo1sWUCL+5b/DGHL8bjHtgWL1TPqsiC
Static task
static1
Behavioral task
behavioral1
Sample
d96103542ad88b7dd63633e1402d004d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d96103542ad88b7dd63633e1402d004d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+pvebs.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/2E65B6F81B88A8D
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/2E65B6F81B88A8D
http://yyre45dbvn2nhbefbmh.begumvelic.at/2E65B6F81B88A8D
http://xlowfznrg4wf7dli.ONION/2E65B6F81B88A8D
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+pskth.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/E7EF1E76865BF565
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/E7EF1E76865BF565
http://yyre45dbvn2nhbefbmh.begumvelic.at/E7EF1E76865BF565
http://xlowfznrg4wf7dli.ONION/E7EF1E76865BF565
Targets
-
-
Target
d96103542ad88b7dd63633e1402d004d_JaffaCakes118
-
Size
368KB
-
MD5
d96103542ad88b7dd63633e1402d004d
-
SHA1
f139d0cdf959da734adb8218bb9ab1070589f0ba
-
SHA256
73da1b9b157a7d2ae3a21c90a114ca7251c32545511a38a3e92b777e59009c45
-
SHA512
c39095411c803ffe51d7adc67b5ac31897fad8914c3c09ea53fee4c3123ac3655dec98af425db093405b079a81aa97e2e5f6a2dc8061a5c812347d2a476753bb
-
SSDEEP
6144:oL9rKjvNvkH1sGf7L4JZ9oL+5b/OcGBJL8dxjHtgWECmCTPqsUPpII:5jo1sWUCL+5b/DGHL8bjHtgWL1TPqsiC
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (424) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1