Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
0bf909d7edbb48834020654296a99ea1
-
SHA1
ee3306cbc61fa207fbda73b782f80207cbbf03e1
-
SHA256
210597746fbea00553304ea445d786834b0f0114f9aab82296b1f6fb3103a166
-
SHA512
d7240226d961865346eec5b25fdcbbc3c452e3965d3d9bb68aa456ad0939a077b9edc8fed0fa09e7954fe6b39b4b871f4cd85f8e4277ced505285b3eae137783
-
SSDEEP
24576:CmS8JhYc1PuxlbXXOBCMRC7wmgg48SkQDw:PltWPXegymbS5s
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral2/memory/3184-1-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-2-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-3-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-6-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-10-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-11-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-12-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-13-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-17-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-18-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-23-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/3184-24-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3184 0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe 3184 0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe 3184 0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe 3184 0bf909d7edbb48834020654296a99ea1_JaffaCakes118.exe