Overview
overview
10Static
static
10ed6e716945...18.dll
windows7-x64
10ed6e716945...18.dll
windows10-1703-x64
10ed6e716945...18.dll
windows10-2004-x64
10ed6e716945...18.dll
windows11-21h2-x64
10ed6e716945...18.dll
android-10-x64
ed6e716945...18.dll
android-11-x64
ed6e716945...18.dll
android-13-x64
ed6e716945...18.dll
android-9-x86
ed6e716945...18.dll
macos-10.15-amd64
1ed6e716945...18.dll
debian-12-armhf
ed6e716945...18.dll
debian-12-mipsel
ed6e716945...18.dll
debian-9-armhf
ed6e716945...18.dll
debian-9-mips
ed6e716945...18.dll
debian-9-mipsel
ed6e716945...18.dll
ubuntu-18.04-amd64
ed6e716945...18.dll
ubuntu-20.04-amd64
Resubmissions
30-04-2024 05:29
240430-f6xncade75 1011-04-2024 13:06
240411-qb4taafb9w 1011-04-2024 12:33
240411-pq9seaeg2z 10Analysis
-
max time kernel
615s -
max time network
1607s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11-04-2024 13:06
Behavioral task
behavioral1
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-x64-20240221-en
Behavioral task
behavioral6
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral7
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral8
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral9
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral13
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral14
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral15
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral16
Sample
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll
-
Size
56KB
-
MD5
ed6e7169456ef1f41f6a45812dda7d98
-
SHA1
c82733e2d394b272db6cbf49aa8a1207c8d9fb87
-
SHA256
85b53edb2e3476bdb29f98bd19c56baa0205e6620917e654cbe81c9745d6193d
-
SHA512
0e7d3dbe68de4301501df68b1eeb36bf68ca3ea61091710352f68f09f8f9b8b96888ccb2419330b2fbd7b592bd98b583aaea818345c87d591b9b0a96845b8d87
-
SSDEEP
768:65h+QW4yKs5INTjabOSQwrPG12nFb5GnVWs6k:63XWNKQ2jnSQyNnFbgN
Malware Config
Signatures
-
MountLocker Ransomware
Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.
-
Drops desktop.ini file(s) 24 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\AccountPictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\Camera Roll\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\Saved Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\OneDrive\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
rundll32.exedescription ioc process File opened (read-only) \??\f: rundll32.exe -
Drops file in Program Files directory 2 IoCs
Processes:
rundll32.exedescription ioc process File created \??\c:\Program Files\RecoveryManual.html rundll32.exe File created \??\c:\Program Files (x86)\RecoveryManual.html rundll32.exe -
Modifies registry class 5 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000_Classes\.F30D4911\shell\Open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000_Classes\.F30D4911 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000_Classes\.F30D4911\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000_Classes\.F30D4911\shell\Open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000_Classes\.F30D4911\shell\Open\command\ = "explorer.exe RecoveryManual.html" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2004 rundll32.exe 2004 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exedescription pid process Token: SeRestorePrivilege 2004 rundll32.exe Token: SeDebugPrivilege 2004 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
rundll32.exerundll32.execmd.exedescription pid process target process PID 3096 wrote to memory of 2004 3096 rundll32.exe rundll32.exe PID 3096 wrote to memory of 2004 3096 rundll32.exe rundll32.exe PID 3096 wrote to memory of 2004 3096 rundll32.exe rundll32.exe PID 2004 wrote to memory of 820 2004 rundll32.exe cmd.exe PID 2004 wrote to memory of 820 2004 rundll32.exe cmd.exe PID 2004 wrote to memory of 820 2004 rundll32.exe cmd.exe PID 820 wrote to memory of 2812 820 cmd.exe attrib.exe PID 820 wrote to memory of 2812 820 cmd.exe attrib.exe PID 820 wrote to memory of 2812 820 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll,#12⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E57B71B.bat" "C:\Users\Admin\AppData\Local\Temp\ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll""3⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\ed6e7169456ef1f41f6a45812dda7d98_JaffaCakes118.dll"4⤵
- Views/modifies file attributes
PID:2812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD572e6685fe8612512c4daceb2930e7b9f
SHA175619d4b0fcfcfd346e1235eb53b5e07e9a2564c
SHA2565bc9167f5792de8898bf74997c1528b400d5314e1e4cb2532b94d5bd432d767c
SHA512d3478e99fc1cd336ddc2688d8d60b07b909bb407c1d97b0d85de5576f0785c1a465fc03776293726d54d07a35319ed55cc8a65f5ca684ae3cb9deaf90075c6cd
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611