Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe
-
Size
615KB
-
MD5
6bd26cf5c685f77d039470ae3395cc5d
-
SHA1
b63de94717c5cbebc75f05b8baa5c95ea5ae9d0e
-
SHA256
a098a49fe6c41b6f1e53d4936de1fef1e97f62e8132dab8a4b0a5a96fcb66db7
-
SHA512
441b3929c14c052b2e97fa4d197e832ce5b07c180948147f19a89fb6a0dfaa7789b6bdd92d86ed66df9ee7d4c110626dccfe129ba9511aa5dfaf4b65011d87ed
-
SSDEEP
12288:cBRpTa1N85A95xy0pRUU6G4RD4LR0zAo0hKg8H+HIUPwXXp:cVTQ20pC4LazAo7eHIUQ
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\WallpaperStyle = "0" 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\TileWallpaper = "0" 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14EE31F1-1930-11EF-9F9F-D600F8F2BB08} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102368e93cadda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000a98b0476f9d5c17d0f6c62f8f9087138149c5bd1a995877895f111b43f17b143000000000e80000000020000200000005a8c0520845c18a4ce487a197866a0a370fb5e40e230dac18f2caf012a8cf01c2000000032bb73176dd3c19c59ae8ab4a0d647247fe5007f65518f4d678780f4df0d036f4000000037ab3963f9321eb2765ac2bbcbb15fab3ee3b712ea17825f456c5f99a406048a5e4b3560746fe07bafe7ed66f2507aaf502939a466e34a78c6842603403d6c16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2956 iexplore.exe 1412 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 840 wrote to memory of 2956 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 31 PID 840 wrote to memory of 2956 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 31 PID 840 wrote to memory of 2956 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 31 PID 840 wrote to memory of 2956 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2028 2956 iexplore.exe 33 PID 2956 wrote to memory of 2028 2956 iexplore.exe 33 PID 2956 wrote to memory of 2028 2956 iexplore.exe 33 PID 2956 wrote to memory of 2028 2956 iexplore.exe 33 PID 840 wrote to memory of 2800 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 34 PID 840 wrote to memory of 2800 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 34 PID 840 wrote to memory of 2800 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 34 PID 840 wrote to memory of 2800 840 6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\6bd26cf5c685f77d039470ae3395cc5d_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2800
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9caaa59085a672c5a79f07d5f5460d5
SHA1f8a69c796d3373e3895ca546533a2488628a1e74
SHA256ebcc23c64825b2630a98de8227089f7e146b69d420f91645a5fe7a08e99d403d
SHA5124c0d09a149753aabcfb9f532a1ca7cba4d5a714b6d4b9c36b8be369ef580af758e06eb73df1b962a49694ab6266090629cd364e872f761b7c0f759134cdf7abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563e5f13ef38f3285db6ac058165da07b
SHA1af0c11316f478b1ef3f29dbb5de4a5bcf4f83c1d
SHA256721d6f532f0c69b354eef98969d9ffea1b5599c4ae6ebbfd93a3836d6d155ea9
SHA5123e9a3e7681d24120218a103ba54b2fe2f1c96f4db7b22b35b0c9c3c257725c07815032f47cafd61da22ff14b9584cd74d60c01e43f6c5ae1a3f86efee052b64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f08ddd5409fc54c333a3cc65f0de67e4
SHA1753cbb143ddfabdd360f636caeadb63f52d6c302
SHA256b2d02ac158ec4e1902420ed1025e3f891fc612e974c518569bb4a9f8c396e5cb
SHA5122b6c50bd155d3e61366f9f06699976b5d625911fd182004e1e3c5cff66cb2fe8d5632a07606b078066bd6fcb84b47d3aa1015a06b1e8f3b0e6cc4cfea41b6391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536a0f4926c91b4c4bb79991ebd314fdf
SHA1864c7ee60711945a67180cae8ba514791d7fb289
SHA2563007fd711a5dd1c3dff815d7f0ab17419c7d33fb1c4660aa5574c69fe85e6ea2
SHA512756d1bc6878a4896795e44f974d54559230c2a5f1efcc1c4295f410f5ed8f57fd4b4059b7f7975b1b14c1fd0c15c7f5160ee2af90a0cecaf99adbd599c2c4f81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f72cc77427c8477305f37e8e00a7934d
SHA1592f9b5fc7d799cc8d2b34d8975c48f544cfca1b
SHA256f367c448453191f85755a807ae1e74bd276c8c65b57c82de10eb022702fbacba
SHA5128f3fa873ae09c81e19620c5ab52b2623d0fb83fcc4b2c1f331daf257b6e06578e59efe58d8650fc8bc255fd36025926bb68f00be5ea9b30ddd9d03ac4a6a12a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586548b0738b136d2011c2f07e0a6a947
SHA16446ea8a72b7cf9ade2663853c51807e42c7a7d8
SHA2561e65162c5ac64949341b5d640327bc413a51c526d0631f805afe558f1ba4ed0d
SHA51273911e1a4c11f47b2074656152a24e94dba61faa0b8d961e014dd6e3c40eb9a5f4493148d98caff0ad3f9ca381c899c3cb7c60aa7e3dbd80de11c787927d2217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d48f607792998bd42894086de999a5cf
SHA1dbef87205dae50a63f9510aea94689e3e3e2896e
SHA256904213eb5bd2ee3436c886a48ccf8572aa6708b54689e89458182a2fc23fb4e5
SHA5127d55b967324760916ef94cc69400edac99955cd76e5f741007d225b08417a92786aaf6e95c3a3c2a8ff8552c7114eddae677af60264e41cf4cca724ad89033b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eedfc786c3773ba57611fd96f04e61b6
SHA104bfb25aa3fbc52e2d4f249ac8270c63a3bae2bd
SHA256baece592da7604443fa6d2462a39a54bf14ec6112af0fdc1bbf238a1a239e912
SHA512d89c6ce220640aea78ae93b7c9d50aeef30999c67abfb7e92f5fc379c44f6b64e6a851f46c9bc979568a9ce62ace889d069d5d219d1ac98b38b3558c567fd6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541f4c50c21b8e2832e255aafc0f021ac
SHA1d17fb9fe5e627ff7fc5a9966f875c7cf9d4f5a1e
SHA2566bec410a3be53b4fe94b0dd2d6b195a393dfff4fcc478d47bc21976fb074880f
SHA51223f6a8b7f85830014ba1ebf6b64409496406de966128d7c43bcfcba458242054b72b95b91174b8b768711dd9f65d9f8d74df17a0452c638d7a11b80fa45bba47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1dc1c144eb4f9b14481c1d93a6b848d
SHA19cc47a2487c9de0ea0d717a2ab0972321d5e7fec
SHA256e174afd2e264a28eab51e408c121e75b2baab1046355b9eae7365d433ca4e611
SHA512d4854f827913110b0b45bb957b92d4cba52b61f1a8543c5df5274a339c1b68da2ec399b423d16bffcc57a85c6d4fb65321bd8140868dbb2014073acc55687f73
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
3.1MB
MD5b38d0d192b7484f73647efffbfdefe99
SHA1461ffb99c38e081f742b734cc893647c8c74665b
SHA256cc1a0f489b11a3b1ebc1a7242f5737685e31b01acbae67219a02c3c30c58ce19
SHA5128181ad837896311ca0abfbe0e5eec1404d6c8399aee2675a818a17245a4fdf556d240fe50cd545be091d245981de102f7d1b2a9dfbc7da81d80d349d26afd8cb
-
Filesize
7KB
MD509688c2a4c20edda4f04da12cb6871f1
SHA143f9d38fd65620eb57419c785c4e35695eb29ce8
SHA256d16a5ce2da8e67b5545e4ab0f2a2bc841eb03023e2acda6a540ef004eb942f04
SHA512d19736fcc0ff95d98c2bdf3245a8dfdaf20dd711cb007f3bee6262cda9fc41bb8468c9c4f7b48cea62d58aecf48d3ba214c084a8ac59ffa2ef6346845adc2bc7