General
-
Target
JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe
-
Size
3.4MB
-
Sample
241231-3e3rlsvmay
-
MD5
3e3c64d90fb826c80e45d9f8791f76fe
-
SHA1
c7c893ef8d3550c773b3523f7c35a827cb65cc5f
-
SHA256
de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf
-
SHA512
ad2cc2abe25800e09c2c34a8943fc5698f28b59e59fb3d89c1993666a75cec42d119bc858c4fdc5114c5ad7b2416e1479811e3047a47c679d72360a536299115
-
SSDEEP
49152:i2cDtPjVrb/TVvO90dL3BmAFd4A64nsfJurbOysDrVyOYF1w86FmCKenPr8bg11I:i2yj7nO7Dpy/Zi4JJOgQ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\etrU_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
JaffaCakes118_3e3c64d90fb826c80e45d9f8791f76fe
-
Size
3.4MB
-
MD5
3e3c64d90fb826c80e45d9f8791f76fe
-
SHA1
c7c893ef8d3550c773b3523f7c35a827cb65cc5f
-
SHA256
de5867fbc85c4f2cd210f60d565c99ab039f0be41c0ec6c7729d795d0ff15ecf
-
SHA512
ad2cc2abe25800e09c2c34a8943fc5698f28b59e59fb3d89c1993666a75cec42d119bc858c4fdc5114c5ad7b2416e1479811e3047a47c679d72360a536299115
-
SSDEEP
49152:i2cDtPjVrb/TVvO90dL3BmAFd4A64nsfJurbOysDrVyOYF1w86FmCKenPr8bg11I:i2yj7nO7Dpy/Zi4JJOgQ
-
Hive family
-
Modifies security service
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1