General
-
Target
JaffaCakes118_34601e5edf184f46c37314559e0a361cbce3aadc451e09f8b84020232fa710ad
-
Size
1.1MB
-
Sample
241224-qhhjmayjbt
-
MD5
05bda4bb2537515927645759f4492004
-
SHA1
fe892cd96ac631a15b9cbc93acfee9bb857ff4c5
-
SHA256
34601e5edf184f46c37314559e0a361cbce3aadc451e09f8b84020232fa710ad
-
SHA512
b0e5708bf3c9fdc7cbb137985f6766b2c654de790fc909d0785a94101640dcd1628414b9fc71f58682ebd4a8736358b6218a1597be57bd27595e48e54dee9b29
-
SSDEEP
24576:k4m40zvnr/4m40zvLZ4m40zvXkg94m40zvLH:k4mTzvnr/4mTzvLZ4mTzv0g94mTzvLH
Behavioral task
behavioral1
Sample
B.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
B.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Build.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Build.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
READ.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
READ.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
rb.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
rb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\Boot\HOW_TO_RECOVER_DATA.html
Extracted
\Device\HarddiskVolume1\HOW_TO_RECOVER_DATA.html
Targets
-
-
Target
B.exe
-
Size
669KB
-
MD5
c17b2c3980926b02136c0a5fb5dfdaa3
-
SHA1
938eb1b7f1d985d134957443d4c43ad551727b89
-
SHA256
4d2b250eb1691bd116eb0004a6b4526afe62631551d6d31d4da482ab5ec3b021
-
SHA512
f770b1dfd74e58ff9d67f0e91ac070e92251598efc45863acf827098cc52f2868c7e2698fd5b0a3a178ea1d1446d32882dfd0601526dbfb27df1251d76c5881b
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DjKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWyKrKe
-
MedusaLocker payload
-
Medusalocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (325) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Build.exe
-
Size
669KB
-
MD5
b446b1c86f3d27bb39783f9d3a112a40
-
SHA1
d9f66f8db27686f4f3b2c7d17557c84077ac801f
-
SHA256
1f5eefc1feb47e11e53f82055ca0921fc1b1299dffa7972c6faeff1904fdad1d
-
SHA512
c2b7682c265060c1c62be0b4dceba7fed6882b9fdc9cbbd1d379608a482bf215d81a2a3c03cc2df709bc936ee7d06ff1250dde92808bd0e0d1f1ee3410c35d9a
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DiKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWPKrKe
-
MedusaLocker payload
-
Medusalocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (279) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
READ.exe
-
Size
669KB
-
MD5
5ec29d96f5fefb2d726f9e120786eaa9
-
SHA1
3f8d050bd4e823b1f2c681856d1ae6d9007d5861
-
SHA256
8ee1f51602f957fa82c7e9c0d834d28873307a0c576ab8c7cc99ca85fcf43b2e
-
SHA512
e21682f2bfee29cd0c0765a10463b2f57bde5996fa367ee2b8b6f7fae9bf5703aec24319ddf2e33890b352331f8fedda41d79ff04ec8a881a6469f6bdba0d5ff
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DaKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWPKrKe
-
MedusaLocker payload
-
Medusalocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (260) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
rb.exe
-
Size
669KB
-
MD5
ae286ff258c5ec1d15a4fd3f64875d5b
-
SHA1
576b9e76e385b389f859ee4bde2d12776bbaedca
-
SHA256
ce0facb2c24c71a20117e27af3aed9d6815500eeadba6e79b472bef539d82769
-
SHA512
f2cf299e20571701ab7a7ad82103317279e8378f114e3de76b22580eb5e8263a025af1fb653b27323645e0ac63983dcbf6f609154a16e8e9d6c81531c369183b
-
SSDEEP
12288:dQA0FfTcwpBuV2UxqDmuiLZeUaoFi2XZWfGe615HhAZV8DiKD/KeX:Tuf4wTuV2Ux3uIZeUBi2Te6HWnKrKe
-
MedusaLocker payload
-
Medusalocker family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (299) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1