General
-
Target
e22903f461b4ba138bf4cfaee0062c9a_JaffaCakes118
-
Size
20KB
-
Sample
241211-s7ns2sypgv
-
MD5
e22903f461b4ba138bf4cfaee0062c9a
-
SHA1
23f785def95f9fd88e7204d276adc0a11715807d
-
SHA256
0c77b9e8d6fab41fcef61741b7c1676348d874293ef2a1c8463fb2ff6616756d
-
SHA512
f218ad91ac09f084ff2fa0dd2ab621b0b47e986962f410a13b84d8b017c21c31d129f85a067d77465f6c860899a7f56eb9d7a78608ca79156fd506b4fe146c5b
-
SSDEEP
384:Ja2iKL1YmLf0r4ZNxBz8E/NOibLm/V4pP/IQd2BQLE6AKFd19t/aSccuo:J3HLpf0EZOoOibLQH06QLE6ASjt/d
Static task
static1
Behavioral task
behavioral1
Sample
e22903f461b4ba138bf4cfaee0062c9a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e22903f461b4ba138bf4cfaee0062c9a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://14c430d846009c5066qbvpseec.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/qbvpseec
http://14c430d846009c5066qbvpseec.gosmark.space/qbvpseec
http://14c430d846009c5066qbvpseec.ourunit.xyz/qbvpseec
http://14c430d846009c5066qbvpseec.topsaid.site/qbvpseec
http://14c430d846009c5066qbvpseec.iecard.top/qbvpseec
Extracted
C:\Users\Admin\Pictures\readme.txt
magniber
http://629824a0e2742e5066qbvpseec.m647u2xsjtlfyzuevlxjiiwjsg2btyhmbxbjz4in4hm76u6hjzc62wad.onion/qbvpseec
http://629824a0e2742e5066qbvpseec.gosmark.space/qbvpseec
http://629824a0e2742e5066qbvpseec.ourunit.xyz/qbvpseec
http://629824a0e2742e5066qbvpseec.topsaid.site/qbvpseec
http://629824a0e2742e5066qbvpseec.iecard.top/qbvpseec
Targets
-
-
Target
e22903f461b4ba138bf4cfaee0062c9a_JaffaCakes118
-
Size
20KB
-
MD5
e22903f461b4ba138bf4cfaee0062c9a
-
SHA1
23f785def95f9fd88e7204d276adc0a11715807d
-
SHA256
0c77b9e8d6fab41fcef61741b7c1676348d874293ef2a1c8463fb2ff6616756d
-
SHA512
f218ad91ac09f084ff2fa0dd2ab621b0b47e986962f410a13b84d8b017c21c31d129f85a067d77465f6c860899a7f56eb9d7a78608ca79156fd506b4fe146c5b
-
SSDEEP
384:Ja2iKL1YmLf0r4ZNxBz8E/NOibLm/V4pP/IQd2BQLE6AKFd19t/aSccuo:J3HLpf0EZOoOibLQH06QLE6ASjt/d
-
Detect magniber ransomware
-
Magniber Ransomware
Ransomware family widely seen in Asia being distributed by the Magnitude exploit kit.
-
Magniber family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (72) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-