Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 01:28
Behavioral task
behavioral1
Sample
619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe
-
Size
157KB
-
MD5
619bcc16546e3d7ddea8045fa88f65fc
-
SHA1
bab813d5a45552978bba9a413089222c3f225a6c
-
SHA256
5fe8e804cc0e7d211019bf37dbb18e4a00af24be11cc9407fac6d648c01716fb
-
SHA512
22997dc1a27b3ee620ab248336dd7a373d7a5217c30135a36943555e605ae7ea81fe55b5c0b596bc14748831144ae91b4272dd6a319cc3d69bea2fa7caccdded
-
SSDEEP
3072:Fi8Iy8EytSLbi4eTMlwDCnuZ3jmOaqGpeT3:U8IUykbnWJZ3jmOaqFT3
Malware Config
Extracted
C:\Users\Default\zg1l099-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/2F15BDB62D29967B
http://decryptor.top/2F15BDB62D29967B
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (184) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\K: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\L: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\D: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\F: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\G: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\O: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\W: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\E: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\T: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\H: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\S: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\X: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\Z: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\P: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\U: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\V: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\Y: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\I: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\J: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\M: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\N: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\B: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\Q: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened (read-only) \??\R: 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4ej6tq8e9.bmp" 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-ntlanman.resources_31bf3856ad364e35_6.1.7600.16385_es-es_9781d5de62353ef2_ntlanman.dll.mui_690e687e 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..owmanager.resources_31bf3856ad364e35_6.1.7600.16385_es-es_05b98a45d5a86346_dwm.exe.mui_706e052f 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-dns-client_31bf3856ad364e35_6.1.7601.17514_none_4a5d2c9ecd59afa7_dnsapi.dll_c81f5791 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_zh-hk_c0d17ceadf33e739_comctl32.dll.mui_0da4e682 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_de-de_440cc22ddf51f622_comdlg32.dll.mui_ac8e62f4 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-t..rk-msimtf.resources_31bf3856ad364e35_6.1.7600.16385_de-de_3be396c6d1b6e7bf_msimtf.dll.mui_e40b8b25 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-u..em-config.resources_31bf3856ad364e35_6.1.7600.16385_en-us_919783112bf8b64b_uicom.dll.mui_4fdc61f8 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-u..erservice.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_1f6e150bb06e1222_umpo.dll.mui_cac12e54 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_6.1.7600.16385_de-de_87cba9e8f27bba0e_winmgmtr.dll.mui_741bfb68 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_et-ee_42b4826dc12f503b.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-session0viewer_31bf3856ad364e35_6.1.7600.16385_none_3ddbd9a9605f0519.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-x..nrollment.resources_31bf3856ad364e35_6.1.7600.16385_en-us_4d5cf87622ff6ea7_certenroll.dll.mui_a77d5a29 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-courier_31bf3856ad364e35_6.1.7600.16385_none_5283fef09ca6fa1a_couf1255.fon_26dbd66b 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-m..ents-mdac.resources_31bf3856ad364e35_6.1.7600.16385_it-it_c4b9ba2a3ac12f32_odbcjet.chm_2a003207 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-basedependencies_31bf3856ad364e35_6.1.7600.16385_none_027847e78a22fdb1.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-d..utoenroll.resources_31bf3856ad364e35_6.1.7600.16385_es-es_bad94050bb1079fc.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-shlwapi.resources_31bf3856ad364e35_6.1.7600.16385_en-us_53a5cec4855ca29e_shlwapi.dll.mui_a6436c6f 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..itmap-ms_sans_serif_31bf3856ad364e35_6.1.7600.16385_none_ac9f9e10add68c8b_sserifet.fon_12fdf5f0 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-security-spp.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5a20bd12960e582c.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-keyiso.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_95503b1f4b07b926_keyiso.dll.mui_4bbf12ff 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8ab09743d05aab36_vdsutil.dll.mui_0caf9b0e 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-win32k_31bf3856ad364e35_6.1.7601.17514_none_17197f29b1265401.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-b..isc-tools.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_11ed75c93fd15e23_bootfix.bin_ee6f205e 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_fr-fr_ebac2cdcaffb8a0e_msimsg.dll.mui_72e8994f 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_sv-se_c75396a474adbc87.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..entication-usermode_31bf3856ad364e35_6.1.7600.16385_none_9616b4da8e0572c5.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-o..iles-core.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ec506ff0bdc9b5ed.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..eprotocol.resources_31bf3856ad364e35_6.1.7600.16385_it-it_a12e2ccede577752.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_th-th_6c5db85765f279c8.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..nfrastructure-other_31bf3856ad364e35_6.1.7600.16385_none_6079f415110c0210_networks_e2d2c811 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-duser.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_a3d716fd41699423_duser.dll.mui_3c369ac4 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-comctl32-v5.resources_31bf3856ad364e35_6.1.7600.16385_pt-pt_c13cbb631bb77948.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-homegroup-provsvc_31bf3856ad364e35_6.1.7601.17514_none_efe3724a04606825.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-m..ditevtlog.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b5c5f27e73b45f19_msobjs.dll.mui_d054e07b 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_networking-mpssvc-svc.resources_31bf3856ad364e35_6.1.7601.17514_de-de_3c9de3a8b639aa1c_mpssvc.dll.mui_4b194b5f 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-usermodensi_31bf3856ad364e35_6.1.7600.16385_none_d8abbed91585a944.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..r_service.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3f36a187d73ae476_iscsiexe.dll.mui_7d81b1cc 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_75107e8ff0ade521_winresume.efi.mui_f412814e 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-irdaircomm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_ac3f1b40be715af8.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-kernel32.resources_31bf3856ad364e35_6.1.7600.16385_es-es_a32fbc5b737d33de_kernel32.dll.mui_c29170cd 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..ineclient.resources_31bf3856ad364e35_6.1.7600.16385_es-es_4c5c5f0b3e948403_scecli.dll.mui_225fa220 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-setupapi_31bf3856ad364e35_6.1.7601.17514_none_931b5f1fdcdd6496_wowreg32.exe_94fc2d06 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-x..ollmentui.resources_31bf3856ad364e35_6.1.7600.16385_en-us_94d14c6cb3fd8b81_certenrollui.dll.mui_e86ca64f 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-kernelbase.resources_31bf3856ad364e35_6.1.7600.16385_it-it_6b111fd2cec4e4bc_kernelbase.dll.mui_16288a65 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-ldap-client.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_0a1287b745a0addd.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_uk-ua_b022280ea23d738e.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_he-il_8bea70024ec7fc32.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..tional-codepage-775_31bf3856ad364e35_6.1.7600.16385_none_2ae98cfeb4d93dfc_c_775.nls_b28dc44c 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mssign32-dll.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_48bc807ccad80bf9.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-msxml60.resources_31bf3856ad364e35_6.1.7600.16385_es-es_3153a0d9a132d2c6.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-coreos_31bf3856ad364e35_6.1.7601.17514_none_83784bb654f0d178_win.ini_ca2ec8ce 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..lient-dll.resources_31bf3856ad364e35_6.1.7601.17514_en-us_b40d05c5d0aff0b4_dhcpcsvc.dll.mui_186571e1 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-r..intmapper.resources_31bf3856ad364e35_6.1.7600.16385_en-us_468dbb8913417112_rpcepmap.dll.mui_349798e1 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasbase.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b9d7dfd0cf7954f6.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-com-base.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_b6f780a94a52ace4_ole32.dll.mui_5035d60a 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..libraries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8fa512baf88959a1.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-shlwapi.resources_31bf3856ad364e35_6.1.7600.16385_es-es_af8fc72c3de10579_shlwapi.dll.mui_a6436c6f 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-imageres_31bf3856ad364e35_6.1.7600.16385_none_dc93f95659399ba8.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-u..em-config.resources_31bf3856ad364e35_6.1.7600.16385_it-it_1e424c3af623a3d0_serialui.dll.mui_7d29d2a3 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mlang.resources_31bf3856ad364e35_6.1.7600.16385_nb-no_9d043a9bb45ba8b7.manifest 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasauto-mui.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_51f6d6941d367e01_rasauto.dll.mui_12fa2c50 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-standardvga_31bf3856ad364e35_6.1.7600.16385_none_f881232cf3b0c322_framebuf.dll_3e9737b8 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-b..isc-tools.resources_31bf3856ad364e35_6.1.7600.16385_it-it_6fc7f6bc4cb64c48_expand.exe.mui_3f54e013 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-cmi_31bf3856ad364e35_6.1.7601.17514_none_abd5b433b8ccf7a4_cmisetup.dll_91548db0 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2908 vssadmin.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\SystemCertificates\CA\Certificates\151682F5218C0A511C28F4060A73B9CA78CE9A53 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\SystemCertificates\CA\Certificates\151682F5218C0A511C28F4060A73B9CA78CE9A53\Blob = 030000000100000014000000151682f5218c0a511c28f4060a73b9ca78ce9a531400000001000000140000007c4296aede4b483bfa92f89e8ccf6d8ba972379504000000010000001000000029f1c1b26d92e893b6e6852ab708cce10f00000001000000200000005aef843ffcf2ec7055f504a162f229f8391c370ff3a6163d2db3f3d604d622be19000000010000001000000070d4f0bec2078234214bd651643b02401800000001000000100000002fe1f70bb05d7c92335bc5e05b984da62000000001000000640400003082046030820248a0030201020210079e492886376fd40848c23fc631e463300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3230303930343030303030305a170d3235303931353136303030305a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f742058323076301006072a8648ce3d020106052b8104002203620004cd9bd59f80830aec094af3164a3e5ccf77acde67050d1d07b6dc16fb5a8b14dbe27160c4ba459511898eea06dff72a161ca4b9c5c532e003e01e8218388bd745d80a6a6ee60077fb02517d22d80a6e9a5b77dff0fa41ec39dc75ca68070c1feaa381e53081e2300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604147c4296aede4b483bfa92f89e8ccf6d8ba9723795301f0603551d2304183016801479b459e67bb6e5e40173800888c81a58f6e99b6e303206082b0601050507010104263024302206082b060105050730028616687474703a2f2f78312e692e6c656e63722e6f72672f30270603551d1f0420301e301ca01aa0188616687474703a2f2f78312e632e6c656e63722e6f72672f30220603551d20041b30193008060667810c010201300d060b2b0601040182df13010101300d06092a864886f70d01010b050003820201001b7f252b907a0876007718e1c32e8a364c417ebf174be330d75b0c7e9c96986f7bb068c02444cce2f2fcd1eadbd29f01f9174d0c9d55fda5ad6dd22f3f4b72c02eae73c7251657c23e15ade031d10a84846c6278423122461aed7a40bf9716814477ca6c7b5d215c07f2119121bfe12fc2ef6efd0520e4b4f779f32dbb372af0c6b1acac51f51fb35a1e66ce580718387f71a93c83bad7bc829e9a760f9eb029fdcbf38907481bfeab932e14210d5faf8eb754ab5d0ed45b4c71d092ea3da3369b7c1fe03b55b9d85353cc8366bb4adc810600188bf4b3d748b11341b9c4b69ecf2c778e42200b807e9fc5ab48dbbc6f048d6c4629020d708a1df11273b64624429e2a1718e3acc798c272cc6d2d766ddd2c2b2696a5cf21081be5da2fcbef9f7393aef8365f478f9728ceabe29826988bfdee28322229ed4c9509c420fa07e1862c44f68147c0e46232ed1dd83c488896c35e91b6af7b59a4eee3869cc78858ca282a66559b8580b91dd8402bc91c133ca9ebde99c21640f6f5a4ae2a256c52bac7044cb432bbfc385ca00c617b57ec774e50cfaf06a20f378ce10ed2d32f1abd9c713ecce1f8d1a8a3bd04f619c0f986aff50e1aaa956befca47714b631c4d96db55230a9d0f8175a0e640f56446036ecefa6a7d06eca4340674da53d8b9b8c6237da9f82a2da482a62e2d11cae6cd31587985e6721ca79fd34cd066d0a7bb 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1948 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1376 vssvc.exe Token: SeRestorePrivilege 1376 vssvc.exe Token: SeAuditPrivilege 1376 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2360 1948 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe 28 PID 1948 wrote to memory of 2360 1948 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe 28 PID 1948 wrote to memory of 2360 1948 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe 28 PID 1948 wrote to memory of 2360 1948 619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2908 2360 cmd.exe 30 PID 2360 wrote to memory of 2908 2360 cmd.exe 30 PID 2360 wrote to memory of 2908 2360 cmd.exe 30 PID 2360 wrote to memory of 2908 2360 cmd.exe 30 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\619bcc16546e3d7ddea8045fa88f65fc_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:2908
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5132dea9d526617f5e040528cbc6cc5fe
SHA1ca94bef2221b6e531d53e648a81ebaed80f80a87
SHA2562fddfc8bedfd281e902eee253e60108df9c921f5c3a682eeff7d77a7a83408cc
SHA512699e1af0280bb4c688250a7bed73865f2b441e09b9c4396a319ef9ea230ed09d11e215059bcb77a41d6a3f384244d9f2ddaf53dcfc6d785812a19bceb8e00068