General
-
Target
4a2592bc635987fa01678a5eff79cdde_JaffaCakes118
-
Size
392KB
-
Sample
240516-j3kq6abh82
-
MD5
4a2592bc635987fa01678a5eff79cdde
-
SHA1
f7554f1f50e31080f6dd6946fc3755984ab4993e
-
SHA256
47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0
-
SHA512
807fbeb38bf285780a1cdb4dee569a077123fbeb28861738f001334171d6d89b7d30e53546f878cd3eff2e8e0763b92ed0331e59397a013150df13860e7e9d52
-
SSDEEP
12288:7pNnoX9enkmyy1SHZNZlnb/vMR7EFE9bthaxS8g3n:s9enkmbSHZNrbI7EGwxkn
Static task
static1
Behavioral task
behavioral1
Sample
4a2592bc635987fa01678a5eff79cdde_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4a2592bc635987fa01678a5eff79cdde_JaffaCakes118.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
4a2592bc635987fa01678a5eff79cdde_JaffaCakes118
-
Size
392KB
-
MD5
4a2592bc635987fa01678a5eff79cdde
-
SHA1
f7554f1f50e31080f6dd6946fc3755984ab4993e
-
SHA256
47f9ce6bbefff2abe7311f6d02196722c95ae080cfb352aea478600a144204e0
-
SHA512
807fbeb38bf285780a1cdb4dee569a077123fbeb28861738f001334171d6d89b7d30e53546f878cd3eff2e8e0763b92ed0331e59397a013150df13860e7e9d52
-
SSDEEP
12288:7pNnoX9enkmyy1SHZNZlnb/vMR7EFE9bthaxS8g3n:s9enkmbSHZNrbI7EGwxkn
Score10/10-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-