Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe
-
Size
554KB
-
MD5
231c717aa085001e0c1ed45bdd748dac
-
SHA1
1fdf786fcfc1debc52e9eb3c045f85a7b3ae990e
-
SHA256
20a4fd18c1fe601d46575a2767a88e786209f652daf12d1766c3757f219ecd60
-
SHA512
1cc979c1b7687955faa338a04435dce25ca3856d8eed1e6252b0b10760d05373ebf2aaf0be28846b5cbcb470678d017da19f51a90af5158b088184b2b26d367d
-
SSDEEP
12288:YQjLuRE4xKR72qKoe/ZWsYUxUKQzZZQZsqtOqQ:nLueaKR72qKoe/EhdKYavQ
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ajijameh = "\"C:\\Windows\\ajywilok.exe\"" explorer.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2488 set thread context of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 1952 set thread context of 2596 1952 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 29 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ajywilok.exe explorer.exe File created C:\Windows\ajywilok.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2648 vssadmin.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PhishingFilter explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 384 vssvc.exe Token: SeRestorePrivilege 384 vssvc.exe Token: SeAuditPrivilege 384 vssvc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 2488 wrote to memory of 1952 2488 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 28 PID 1952 wrote to memory of 2596 1952 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 29 PID 1952 wrote to memory of 2596 1952 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 29 PID 1952 wrote to memory of 2596 1952 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 29 PID 1952 wrote to memory of 2596 1952 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 29 PID 1952 wrote to memory of 2596 1952 231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe 29 PID 2596 wrote to memory of 2648 2596 explorer.exe 30 PID 2596 wrote to memory of 2648 2596 explorer.exe 30 PID 2596 wrote to memory of 2648 2596 explorer.exe 30 PID 2596 wrote to memory of 2648 2596 explorer.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\231c717aa085001e0c1ed45bdd748dac_JaffaCakes118.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer Phishing Filter
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:2648
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5ce799cdfb540717e13b5ddabe359cc42
SHA18d275189f324af52da4f4f1869b804ba31d0ffb7
SHA25604d265d7a1148e77300ffe7994bb184efe8330ed1306648afb219af2dfa33dab
SHA512cf1f5d155dc5e90e625f5c70765f4ea916f53c3db3625fb877b49a960b34cec3f500a9c660ce6bf50e0956619013fceb26b6e5e058278bacaa789f34bf142fdb