General
-
Target
f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118
-
Size
500KB
-
Sample
241215-qnnb3axkdm
-
MD5
f434ffb5c0ee41107301cdd2870b8cb3
-
SHA1
0f07886af55ecc7b12f6e16fbe2ab58d72f7293e
-
SHA256
905c987270df31e328c785f35f4b106624137a71e3785d31af946dd525218211
-
SHA512
3743ad61166066c9393880c54434f9e4dcaafdbd16df737d2e43c27c567e7b0ea20790ca8fe9dcbed775184863cc82e52217ebb9ba771dff4f5dfb43666dde12
-
SSDEEP
6144:2+5uzIF/dV6GdE98vJwvw8AWLG1qSrX6T26WyJNh:V5uzKdzd7RazYtT6Xh
Static task
static1
Behavioral task
behavioral1
Sample
f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fuwmo.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B0655EE562323FC4
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/B0655EE562323FC4
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/B0655EE562323FC4
http://xlowfznrg4wf7dli.ONION/B0655EE562323FC4
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+koamm.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1441D4878A9831B
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/1441D4878A9831B
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/1441D4878A9831B
http://xlowfznrg4wf7dli.ONION/1441D4878A9831B
Targets
-
-
Target
f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118
-
Size
500KB
-
MD5
f434ffb5c0ee41107301cdd2870b8cb3
-
SHA1
0f07886af55ecc7b12f6e16fbe2ab58d72f7293e
-
SHA256
905c987270df31e328c785f35f4b106624137a71e3785d31af946dd525218211
-
SHA512
3743ad61166066c9393880c54434f9e4dcaafdbd16df737d2e43c27c567e7b0ea20790ca8fe9dcbed775184863cc82e52217ebb9ba771dff4f5dfb43666dde12
-
SSDEEP
6144:2+5uzIF/dV6GdE98vJwvw8AWLG1qSrX6T26WyJNh:V5uzKdzd7RazYtT6Xh
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Teslacrypt family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (422) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1