Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
40852e7dd5100b1b5e361aa315ea4f46
-
SHA1
ec22d8c3890250375cde4d7049decb364c4046c9
-
SHA256
23d15f5b8f0321538fb8a9bc7ae39866dc992742d851df6e8c339660961e9cd2
-
SHA512
38fd9af068b9cb3d78f1a4207ea04fd10877a9690a39e484d490ff124cc90ee6c830a372880bc03c92465739eddac98622af0bbec62469a281120775667cc3b1
-
SSDEEP
24576:N2ZPR4CVCQ3fe+b5oUFFzGigxoG9CXS9Oki+VIYEb:0ZZLVDXpzAoG9CXS9k+VAb
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
resource yara_rule behavioral2/memory/4456-1-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-2-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-3-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-7-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-8-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-10-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-11-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-14-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-15-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-16-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-17-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-18-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-19-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-20-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-21-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/4456-22-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4456 40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe 4456 40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe 4456 40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe 4456 40852e7dd5100b1b5e361aa315ea4f46_JaffaCakes118.exe