Analysis
-
max time kernel
125s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe
-
Size
615KB
-
MD5
683cf9bccccf3ab30d8655e0fc3996f6
-
SHA1
cce97b2446f962df6df17785bcbae3d8283cf523
-
SHA256
73cd7a019317b2cabbe269e5afc88b1fcd0508797a7eef4e9f9d3cdc1840fb4d
-
SHA512
4d7a45db319a9e3f5fe14720b9bf2079a128167e5bdbd7ea19a2b5649b215c89076a1fb3a7ff51fdad327702001c02e24add3f2e85ec977140d883b663a88135
-
SSDEEP
12288:HBRpTekU9TDkYwXkqqem+1tom7OxiWwHI1DRJ5hTBH41CXYXHSe2:HVTLUJQua2wo1DRJX1shHF
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\WallpaperStyle = "0" 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\TileWallpaper = "0" 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000004870c7fced76484f363a07cb45d65269ce748ed9fc6f60d4960be794f6966475000000000e80000000020000200000008a9787cd3be74c5b2bc06570a34cf23e78fa3d5173488ea749b35a611a7908bb200000004e0e27c5fd479a00b64232fcf1f69a862c7abda41e116dc2e5ff408252faea104000000090c7cbfd96ac8e1910e876de3c56a921e5ad7d0fa0b61b0a4626e6fcf53fa04cee8a30fdb02799f6624686298158dc3109343f2ec9e55b9a4f6ad3694a034260 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{269E0441-186B-11EF-A538-5630532AF2EE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d110fb77acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2720 iexplore.exe 2684 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2720 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2720 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2720 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 31 PID 2348 wrote to memory of 2720 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2788 2720 iexplore.exe 33 PID 2720 wrote to memory of 2788 2720 iexplore.exe 33 PID 2720 wrote to memory of 2788 2720 iexplore.exe 33 PID 2720 wrote to memory of 2788 2720 iexplore.exe 33 PID 2348 wrote to memory of 2584 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 34 PID 2348 wrote to memory of 2584 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 34 PID 2348 wrote to memory of 2584 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 34 PID 2348 wrote to memory of 2584 2348 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2584
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f044d25b87493436789bf47e3c038ef4
SHA11ad5681a2b2cb6e88eb873a5894edf98036074a1
SHA256aeb693e5d2807b5a1b666c3efbca5aa590b452bc1b977d38ce720f8985189b9f
SHA5126357d5e4c219afae045758945bc4ecbb203e6d0a1048b7cc56e4c98f25a5f63b85518fedcc50e31ef0cec09e2c3f379c8c20d527dbc32933c50f740b8b702c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf66521670752487f3467e35c247a9d
SHA1aa5e22b205abbfd84c34e886156b7bebc9a40cc6
SHA25673ba176a68ed00230abb9366b1a184e0b75829f4e2fac742fd4a20164fce77f9
SHA5128deb56a20d27d888206034b30881020015306c76e797dbe53a01287abb33b4d81f88aa0bf55faa6a6cdf7d89bda317af546f47baf07653a4cf7168dad74adad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98693f38c65a26be045067793b22c46
SHA1ea99a9d4d7736d4ff193b90988a9351524a0969e
SHA256dcbef40a21bb4790bb308511ecfdff0511601a9011dcee2a87026f8861bdf50a
SHA5123a37a88dc0c4319e7f29c715d9c50a251894a1a00c7a64ab3be2caed193f1fc108f4c17030ff33e596424bf4f4cab04cd47813df8acaef938b8cf8e142a422c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b41f8989e5b3c93a42a54ab942906c56
SHA106d74500a5aea9e37047da754e9c0d455e8afbe7
SHA256737a3f9f67e97775d6ec9d1adab353cf1b74c7f4bdc4918746142309d561f967
SHA5122ee0d858751e105c20cdf61626692db7cb4ea9dce35ea698b7312755936f420305c96d8d708d010a8c8b35aa36a5779ef0a3b62a2c542f61c9d5a1f112e75b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a86bfea545ec24065298a7f3aed0f65
SHA19d915a9abc1dbd8021527ddf117d5dc9e1417d1e
SHA256d04cd741b4bcb6d8f577fb784621c7c3d1c2c5f7c23ddc49a395e5aeb94ee49a
SHA51269d2068bff1bb6b30154408cdf2cbed7887fcb4bb4d24f66ca93563bb2f5a54f93232dd32547a754ec78fe6cbeeaf851eac6bffdd7dceae448e2eed90bb2743b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e90e65a80f60da10d43830995158ed7
SHA130c6984b366934a9dfecd2aefb119e3997b1568a
SHA256ac1ce1b654f248abd9deb1ae1ffc39bf4c6e2410b7030556713bc64a822c104e
SHA5129a363d5296fdc3c0489b092599390c4a8f481b5f7ce6e42c0c38ec42f9e1ec1bba4a9e9c0ec70be4a60fa026b4573758a6a7031ff432cbf719144e0db51f2bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af79a7aaa8eb3a1189aa51384740b6dc
SHA10209a6397605e37426b2fc1a64145fb9f57ebae5
SHA25666a4d5e23572b302bcc62c3d4baf7f6cbb2c61d791198a0077aa51b8533540e0
SHA51252c6d4d8a78fadc9a2866b766a21533cddf8d7002474b7606fe085163cc1ebc9202b8a9051feb5c415e936f3215cac4918d61076d74b98c63430b34f9b2d19bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7aa335e8fb88539e2fb46098209b0d2
SHA15cac3af7a3d81f2c5ea39b9b2d007e2c6664b3e4
SHA256df245599cf805a1db8fb5f96afcc07e304e1bb7816e152e7ffa279badee71c79
SHA5125fdad3594c04fb53a45e2eceae1a530ff268c0f8eda9759a3c25c1fc7ee07c61c059b8ae85ce41a41c8976aa81e38ae3d2aa865bce6fab47ddce699050b08ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5422347c01f45645d70a09564d7ac46a8
SHA1cffe9629064f32fcabe5182bca0baad695bdd2f6
SHA2563eed3a7526f4e277097eed1b8481caf940ad053a218d1a57c4bb153ed4342a20
SHA512cb00e7766553e255793fe0de5edf190adc58f05c65a466395e68eaa3703b4072eacde5e14256a5f779b18a7a98074c21c76d518442c7318ad6e1cf2dce10d832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5788574e9699f355372f5cf46ac3564e3
SHA1750aa529b11f614b068925a833fa7c0feb519ff3
SHA256589d55e0923eb79c0e8a6ce036c6344effc5c7458a2c721bcf418b8ac7f3652b
SHA512bd07c9f2999f1bc96e08132cf5b41c4aef2a8c64b64be43b8a1af45abe3120a6e25c36d8495d98758708ff4405bc8991a2d9fd55c01779d1681a52034d0c14b8
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
3.4MB
MD54170e0027b237491450eb09e52202516
SHA1ea5b5336e13e58cddeedce912bf10f58ca524a60
SHA25647b8ed7b5fbed876a185c328f270b88ac4c87e532d435d7adfa79a302f5ed7de
SHA512b83ba8a832d7715d9af69308e49db47248e38099bd06c85d4191ba576cf4d0c436b23d2d3855c81bd480a7b6ec81d7041acd9ef4d7ce8f385ebcb1391808bd21
-
Filesize
8KB
MD5475dc6a0091be6ed6e2e7105d34cf2e2
SHA1c235aa1ff87ea060e9f0dac6f72a4a49890576db
SHA256f9132387e9ef344c104ad29b455afce2087ead5c135363c286d477bbc9eec7a2
SHA5121f1ac0a0fb37ce2ebbc28c26c4f8161923c6e755b716abf16b03ba243dd0d97c25641caaa31272f2f40ca702750f0d6d22f47fc62aa2c06874f3c66c417619f5