Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe
-
Size
615KB
-
MD5
8f1c524cd3dd25e3d7b0e958db51048f
-
SHA1
7c37371d755738b20f8f5ab9ca236d04c9a0d60b
-
SHA256
fa5a353c16cbb3bc976b2a37abc69f2a0367e30093e68bb8986db106d2fcdb9a
-
SHA512
52a5b63e97ea67b15a43a94a916040fd727bb840cc26f1615cd81ab656a5e99258fde5f46b657d9d2b1ff072a266fe501ec450914a1027a2f6c98044ce9783fc
-
SSDEEP
12288:YBRpTibB8xNbXVhMnlodESdkVU6e23mBH9XPfHL2ad7s51:YVTFx9lhWlM2zfmBH9XnPW
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes itself 1 IoCs
pid Process 1204 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Control Panel\Desktop\WallpaperStyle = "0" 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Control Panel\Desktop\TileWallpaper = "0" 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000008ab48898eea37e08f224539f6baae27d4ecfe02f67167f135104d7cb3a1ac718000000000e80000000020000200000002bc6be4541284808fe6bc9d83e225a0e17711438152d4c1101dcc0db4c01a7e52000000044b99bcac95a5d0f0b2982b61f76285c41560018b198f637ac5cf20262f7c9fc4000000063fdc4fc53479497cf741d56363120da9033b6fd420b66ae301b3342b10cb206b80334f60288abfc0dd32781b2fd6a36f954859e345a55c1681512dd8961349a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E944B4C1-2113-11EF-8C89-6200E4292AD7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c08ccabd20b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2188 iexplore.exe 2160 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2188 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2188 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2188 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 31 PID 2232 wrote to memory of 2188 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 31 PID 2188 wrote to memory of 2272 2188 iexplore.exe 33 PID 2188 wrote to memory of 2272 2188 iexplore.exe 33 PID 2188 wrote to memory of 2272 2188 iexplore.exe 33 PID 2188 wrote to memory of 2272 2188 iexplore.exe 33 PID 2232 wrote to memory of 1204 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 34 PID 2232 wrote to memory of 1204 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 34 PID 2232 wrote to memory of 1204 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 34 PID 2232 wrote to memory of 1204 2232 8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\8f1c524cd3dd25e3d7b0e958db51048f_JaffaCakes118.exe"2⤵
- Deletes itself
PID:1204
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e812f8d8c2a69bcc785ffa54f4a15dcb
SHA1151083134ed4338e9cd48ce2a29c4665d38e9581
SHA2564fb2736e04fde2f10d4eb9c4c708f729ff0022d35428679d305a69c296f8f484
SHA512ce78355870b8bbf1788ca8b2cd75a5eab8b0ff0f3eb76029d411e3ee2f8f56a0739ef14d21147872bd7cb06d120ab5652765cf8c6c2d089ffd04d207cd86ff1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e91d904f08606134ee99d70b6065fc2
SHA1b312713c06d6403d30ac02e79f2162a49d75eaeb
SHA256c156dd549ebaaea151788a99fa5e0ba68fc23cb700c3a45604cbabd8f2dca612
SHA512e252175091af298117263dd9a9372109ce0fd1051d95eaa87b68e65f46b2befb12785607f43ebfdafe4f214a5abb9ac22f2802d47c96ffafc9995f15da8781ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbd3d08fc80aa6592f3437b9e0cb7430
SHA149340def42c1bbe80794de75885441d171b967f4
SHA256d30465e0cdf35bd41db9a6dce2d23d32e3b6117d03ed95dc993bafbc019ab748
SHA51293375fae826414e5532400d82e55040b177574d7d93abc513b2b3c01147701f21e30532fbab9a167f5ddf10f640eed71cf2d21de4c338443f2c051f9c0f7082a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af579b3b94470d4c2cd3a496ccf1a70
SHA1f33305dbc9ab6292103bedb5d77977b408e8f648
SHA2567cfcb3f57f7afca3f1ae4055e361d3be16f770bd90746eea20d8ff8a79c362f3
SHA512bd898d3f3be385f7d4c3cfd67bbc8e1413b38aa90fa578f31516065556528eef7be753d20ab14efd9b9503ebbdde5d0fcef8e2e1b641988b1499812a5d1ed3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bac14724a496c770622073eae42ba1
SHA17d1f03fcba9c0ced2008f6c8519d756c2ad21eb8
SHA2561c04317c663fee7065bf974bc0c11b9fb4dd70818283e630d280069db129a9ac
SHA5125df2ff58bdcc2d0f28076b07ac1e8ea656852a9863091ca708408be0280e5d6b5936c122a70833e0a80bf8595e233f4a1d0b47dba9b4825934add63c665165d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af4710ff1a26193d6969bbfa756e9de
SHA1b9d9c7efab258722c0153fe60090d6bd6ebf9279
SHA2569ab29dd1235e46bbf28512981f78c54c7f509726c7f2a29bb2c7b84ece9737d8
SHA512df84aeffc799deead72e2130e701bb5d31d96b3e5eb36bfe47169a0cdb1016bec9eab232b649c06759e7969fa2d4885b1edbe8ede46df87a7deea30d630b4540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502669f93bb0084970a52dbec275280ab
SHA161a5f8758eec86943c1f0c0bc8f52d3ce3379777
SHA256fc2b78c786a8b3e4b6daefb8527c68555508521f0e1c6ed2933022d132eb72e8
SHA51252f1e8fdb1ebb274a43e7a5f5cad2f8b065b8953924f3037c70ee2842a9796e25b156ef36ff73915392841f9535fe7343aa3bb4c5bf2d650c454c6742373e9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c800f628f943ba9258695f50d0b14e86
SHA13e33ebd32955e2f5250dd59370e5b4866827b89e
SHA256cd59ee758462df3a29e307829a05828800954eb2b5553247675429323b521fe4
SHA5121f94989190c2e336212b9820ce2b6dda25f1a65622ed47973e71f5a9179b5f6dcc66f977f22ca3d628d0cf29701278ad9e630ead2edd32a27c37f349f621a941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1c7d279e6b5e2a674761f8fd4db854
SHA119c3770d44e9adafa5ed3f42a7a5335addd80700
SHA256cc55dd9569cb12b19d2504d29e9e7f616e44195f14a136ae1ca2d8104f53a60d
SHA512a3f1e1b71b3dc6b9c17b9e155e071a9f345a0c652130e125d05518ffbfec28c5a18487b018e83f04f2cbaa7b9554c98a56194c8aebcb8ad95a9466bd71314df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce89619a94f2e86d6c63eaaec4706c6
SHA1957b34e5654026962f60f3a25778ae4869e21cf1
SHA25603f891a10335f1d9b12710493ab857cc8395b43698b443a17e600fbdce1611ca
SHA512ee5a3491e7dee82c44d12457ee43ec6f5a06b8c9bce4c1d10c2c9e9606f9148b4c77d95c9103a86bbb877c67c183bd1f8b2e86402534ce62c3e31cce5dc9a646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c49b3df34007e7f5c05e84633e6b3d2
SHA1d14e933f994d1ef570e815ef3c15014b2709819a
SHA256afd512a815d1eaf523c85de4c2e326346f8a3c3ec0c8ad19150674ec6e589776
SHA5121c6ee816ca331a54ebd7d4fd87d4a154bbcd8174df0464b936caee1f74761fa551ccc9336756223b10168f30d4938b48ab3520fe39fadd6ade11da0baa4eb5e7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.7MB
MD52a349e5ed9b69469aba5bf79a2737f42
SHA112a8d9157af182946ae37deeb6b9e92177d1cca3
SHA256421a3bd3d07b3e49c8ba14b1f12330985d7cd419e18c44734ee4b9c941505b87
SHA5126725d60e77a649a8649e77c31df78e849c75fc4893824b51d79ecd1134462f159fc6c26c6e1554723896350711e61831ebde887cf530c8e41e6a33d0a8eb9df4
-
Filesize
8KB
MD591c5e6c30d176be48f54a96380f75b52
SHA1ee1251d34bcbc0d6355615d7cf87b470ac69a8ee
SHA256a48fffb6eb5fb5cce4763211f3af75ce9d4bd7487014dee8dff8c7a6a899fb1d
SHA51299ba383348ab92906dd74d65f5622360def308c82961980df663bccc24de447e33e31d9f3d5938f0371f9f2d105ffd3d58d4a43ded62160b8ad5c54591f75a63