Overview
overview
10Static
static
10ed6e716945...18.dll
windows7-x64
10ed6e716945...18.dll
windows10-1703-x64
10ed6e716945...18.dll
windows10-2004-x64
10ed6e716945...18.dll
windows11-21h2-x64
10ed6e716945...18.dll
android-10-x64
ed6e716945...18.dll
android-11-x64
ed6e716945...18.dll
android-13-x64
ed6e716945...18.dll
android-9-x86
ed6e716945...18.dll
macos-10.15-amd64
1ed6e716945...18.dll
debian-12-armhf
ed6e716945...18.dll
debian-12-mipsel
ed6e716945...18.dll
debian-9-armhf
ed6e716945...18.dll
debian-9-mips
ed6e716945...18.dll
debian-9-mipsel
ed6e716945...18.dll
ubuntu-18.04-amd64
ed6e716945...18.dll
ubuntu-20.04-amd64
Resubmissions
30-04-2024 05:29
240430-f6xncade75 1011-04-2024 13:06
240411-qb4taafb9w 1011-04-2024 12:33
240411-pq9seaeg2z 10Analysis
-
max time kernel
1558s -
max time network
1559s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 13:06
Behavioral task
behavioral1
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-x64-20240221-en
Behavioral task
behavioral6
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral7
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral8
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral9
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral13
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral14
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral15
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral16
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
-
Size
56KB
-
MD5
ed6e7169456ef1f41f6a45812dda7d98
-
SHA1
c82733e2d394b272db6cbf49aa8a1207c8d9fb87
-
SHA256
85b53edb2e3476bdb29f98bd19c56baa0205e6620917e654cbe81c9745d6193d
-
SHA512
0e7d3dbe68de4301501df68b1eeb36bf68ca3ea61091710352f68f09f8f9b8b96888ccb2419330b2fbd7b592bd98b583aaea818345c87d591b9b0a96845b8d87
-
SSDEEP
768:65h+QW4yKs5INTjabOSQwrPG12nFb5GnVWs6k:63XWNKQ2jnSQyNnFbgN
Malware Config
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\RecoveryManual.html rundll32.exe File created \??\c:\Program Files\RecoveryManual.html rundll32.exe File created \??\c:\Program Files (x86)\RecoveryManual.html rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.F30D4911\shell\Open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.F30D4911\shell\Open\command\ = "explorer.exe RecoveryManual.html" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.F30D4911\shell\Open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.F30D4911 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.F30D4911\shell rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 rundll32.exe 1612 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1612 rundll32.exe Token: SeDebugPrivilege 1612 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1612 2940 rundll32.exe 28 PID 2940 wrote to memory of 1612 2940 rundll32.exe 28 PID 2940 wrote to memory of 1612 2940 rundll32.exe 28 PID 2940 wrote to memory of 1612 2940 rundll32.exe 28 PID 2940 wrote to memory of 1612 2940 rundll32.exe 28 PID 2940 wrote to memory of 1612 2940 rundll32.exe 28 PID 2940 wrote to memory of 1612 2940 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5360561b2b96469fe7d2982087e852e7f
SHA1170ee129a74cc8da2ee97ee2018dbf25ab45447b
SHA2565c288ea7f1386c3bbe41548fbac40c0cef0c3b0ac9e8fd4b4edaf9eb7bea1e74
SHA512dbc4c7239cd188d1a270b3fea4af332a4b3fb65684de4609be6259a45ad8af59d166070db5380fe2ce26b04339bbdd987e4f9eea7a1459d25de8f0d0e824b320