Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe
-
Size
183KB
-
MD5
83366122929164c8f35fccad65a2f7b0
-
SHA1
ca6ea17dd6e85ebf638546b967e535995f5fe58c
-
SHA256
762767ec5af85af701088d29480b761fe53275c340734b99050500b18a065ae5
-
SHA512
0d3ad8799e36bd94781208637515c4d9351b4c75aaf82ed3cf2f16b946446357024eaf7ff255b88a0e9e33c1e3f7725deb66990519ed63d125303edb082d3243
-
SSDEEP
3072:n/BIkrLUkMZ2m7ksIS/bOpd5kyqdGev7:n/BIkfUV27sFbONkn
Malware Config
Extracted
F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\BWCLKMXN-MANUAL.txt
gandcrab
http://gandcrabmfe6mnef.onion/244ce4abd72ced48
Signatures
-
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (289) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\L: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\N: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\W: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\Z: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\Q: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\R: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\V: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\A: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\I: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\M: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\O: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\P: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\B: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\E: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\G: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\H: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\Y: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\J: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\S: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\T: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\U: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened (read-only) \??\X: 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\bxmeoengtf.bmp" 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files\StepUnpublish.mhtml 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\BWCLKMXN-MANUAL.txt 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\d72ceaa5d72ced4b316.lock 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\BWCLKMXN-MANUAL.txt 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files\d72ceaa5d72ced4b316.lock 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\DisconnectAdd.wvx 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\HideSubmit.mp4 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\StepSave.vssx 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\UseApprove.asf 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\d72ceaa5d72ced4b316.lock 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\d72ceaa5d72ced4b316.lock 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\d72ceaa5d72ced4b316.lock 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files\BWCLKMXN-MANUAL.txt 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\AddPing.xml 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\DisconnectShow.asf 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\SuspendNew.dib 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\BWCLKMXN-MANUAL.txt 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\BWCLKMXN-MANUAL.txt 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\EditUse.cr2 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\ResolveAdd.odt 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe File opened for modification C:\Program Files\SplitSearch.sql 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 8100 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2772 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe 2772 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 7524 vssvc.exe Token: SeRestorePrivilege 7524 vssvc.exe Token: SeAuditPrivilege 7524 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 6484 2772 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe 31 PID 2772 wrote to memory of 6484 2772 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe 31 PID 2772 wrote to memory of 6484 2772 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe 31 PID 2772 wrote to memory of 6484 2772 83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe 31 PID 6484 wrote to memory of 8100 6484 cmd.exe 33 PID 6484 wrote to memory of 8100 6484 cmd.exe 33 PID 6484 wrote to memory of 8100 6484 cmd.exe 33 PID 6484 wrote to memory of 8100 6484 cmd.exe 33 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\83366122929164c8f35fccad65a2f7b0_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:6484 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:8100
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:7524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD58b880f2e9f61567c2d32e973fa8dfb45
SHA118f1837800c6276975cfb0c2387e3c7c7767e352
SHA2560b9f06cd9953f43c21a42a2976046c46fbcba5d095f3553b11fc776d61f5ee01
SHA512e7d0f02af6690f6018e66794f915d0f9f8a21e8d25ed238d27a187196e43e40487fc56b87480fa83b5418c1d7388e3e41f2ee8fa65fbcf1805eb374dab05dfab