Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe
-
Size
615KB
-
MD5
683cf9bccccf3ab30d8655e0fc3996f6
-
SHA1
cce97b2446f962df6df17785bcbae3d8283cf523
-
SHA256
73cd7a019317b2cabbe269e5afc88b1fcd0508797a7eef4e9f9d3cdc1840fb4d
-
SHA512
4d7a45db319a9e3f5fe14720b9bf2079a128167e5bdbd7ea19a2b5649b215c89076a1fb3a7ff51fdad327702001c02e24add3f2e85ec977140d883b663a88135
-
SSDEEP
12288:HBRpTekU9TDkYwXkqqem+1tom7OxiWwHI1DRJ5hTBH41CXYXHSe2:HVTLUJQua2wo1DRJX1shHF
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\WallpaperStyle = "0" 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\Desktop\TileWallpaper = "0" 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4612 msedge.exe 4612 msedge.exe 5060 identity_helper.exe 5060 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 4612 940 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 105 PID 940 wrote to memory of 4612 940 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 105 PID 4612 wrote to memory of 1208 4612 msedge.exe 106 PID 4612 wrote to memory of 1208 4612 msedge.exe 106 PID 940 wrote to memory of 3596 940 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 107 PID 940 wrote to memory of 3596 940 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 107 PID 940 wrote to memory of 3596 940 683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe 107 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 5052 4612 msedge.exe 109 PID 4612 wrote to memory of 4696 4612 msedge.exe 110 PID 4612 wrote to memory of 4696 4612 msedge.exe 110 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111 PID 4612 wrote to memory of 4552 4612 msedge.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\lukitus.htm2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe967b46f8,0x7ffe967b4708,0x7ffe967b47183⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:23⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:83⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:13⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:13⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:13⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1306686439487632938,10453794142563642206,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\683cf9bccccf3ab30d8655e0fc3996f6_JaffaCakes118.exe"2⤵PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD555cc8a59270de4eec8372c2c88a2c7b0
SHA17e0f3160f42c7c1227dd1d5cfe9f792cef63b52f
SHA256ac8da203dbd2954805e89a336db7b6c6ffc252b264cdedafdbe99c4e3e0ea036
SHA5127e660c005ee1659e6976c2e5bf28b0fcc304015e7b7a71f7f21fef73e3487f5830de7021818e28c5365960e66653ff50b31d3b32efe058a1fab0f53be44f3af0
-
Filesize
6KB
MD56f785e8763c51c29b7ec84d5f190cfba
SHA174d0b23323a8d661b96463160c70c84eb791a0ef
SHA2563db58c9a6bbc533ccdda6a335131dbd09f4135f2728893a41992758d7dd7f1b5
SHA5123af657f3ade1a6fe4a9f16a48d8df238cdb5170f8f55352537aed3723125e69346a10b5794197f5ef87450bc2a9cbdfb9f7936db6de960301da2b33dc4c41023
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a121c6c5ba92bf63c8feef89586f5a29
SHA1ada7b712715d4744fb67c1051beaebb936275b8f
SHA25632433d5b4b5d7ce3cbd10cdb1298e119b3226c94b3ab05aa9413cf4c342c3399
SHA512f4a8656c69221c1486419aa4b7102ff4d772ef1f6fdee4e44154916b80e8ba11f1a82b22b50723ae0f0562b2c2c9059dc439ba427143d03468ced6c4b5b4a239
-
Filesize
8KB
MD5b84fbec69d0fb8454bec6774def1587e
SHA106c95434b77c0c0b05c051ece24020dcbb206584
SHA256c9fc3763b69a86c0caf0af6a430b6e2e5f770d63babbd3407e7957218612bfdd
SHA51253a30305a158019d5db1f0cc0f1bdab7069f3607fec90b97fd659bb862a825f9b9eb138d85a7076970d1aeaaa71ada68e4275d39855b57b43e958c73feed2d6a