Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 14:33

General

  • Target

    9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe

  • Size

    364KB

  • MD5

    9533202d7c1075d12f1a900cf8c950c5

  • SHA1

    cd23d34033b14515a084bc2b4870c11cacde0f15

  • SHA256

    2fd6e890d882a29f4cfadc123f8016e584a864aba3c1166dfc0fea4f37a66fd8

  • SHA512

    f76108c1014882ea2671cf91755645af6a33f835bae597ecab6d81b02b564501b1380142f5cb8b638ae6751845d930bce69696b13849be88b9676805894071c1

  • SSDEEP

    6144:1zGwKmwzQoBnpA2cQJ4R1Y9+sSj22UJre6OmLFrHXvu9dEP8vWy0oB1wO5Vzt4:VKmwzQoBnpAkJ4R1Y9+nrKZJFrH8dvvC

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky (Osiris variant)

    Variant of the Locky ransomware seen in the wild since early 2017.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\DesktopOSIRIS.htm
      2⤵
        PID:3576
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe"
        2⤵
          PID:4260
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4080,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3976 /prefetch:8
        1⤵
          PID:4188
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=1268,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:1
          1⤵
            PID:872
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4984,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:1
            1⤵
              PID:4476
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5308,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:8
              1⤵
                PID:2388
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5288,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:8
                1⤵
                  PID:3256
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5716,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5824 /prefetch:8
                  1⤵
                    PID:3216

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\Microsoft\Diagnosis\ScenariosSqlStore\OSIRIS-466e.htm

                    Filesize

                    8KB

                    MD5

                    e40b80d158474bca5d6b5c52ef57a639

                    SHA1

                    b625a185b666a9ad747eafd1ba4db1c4dd7c9bf7

                    SHA256

                    faf2bbaffb61f6e7b0fc6672c16f102bd99cbf1349d18cf0a1dcf3b37d275fbb

                    SHA512

                    1d82134a88235bf6e502c60048553853e482c73e46049cc42681eafba3a90ad289fa06ffbedbad7fcc9ef6b79724cbd807b4dfbebc44eca0859ff0f172f85d94

                  • memory/4428-0-0x0000000002AC0000-0x0000000002B74000-memory.dmp

                    Filesize

                    720KB

                  • memory/4428-1-0x00000000023E0000-0x00000000023E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4428-2-0x0000000002AC0000-0x0000000002B74000-memory.dmp

                    Filesize

                    720KB

                  • memory/4428-3-0x00000000023E0000-0x00000000023E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4428-4-0x0000000000400000-0x000000000045F000-memory.dmp

                    Filesize

                    380KB

                  • memory/4428-7-0x00000000023E0000-0x00000000023E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/4428-8-0x0000000000400000-0x000000000045F000-memory.dmp

                    Filesize

                    380KB

                  • memory/4428-20-0x0000000002A40000-0x0000000002A67000-memory.dmp

                    Filesize

                    156KB

                  • memory/4428-21-0x0000000002A40000-0x0000000002A67000-memory.dmp

                    Filesize

                    156KB

                  • memory/4428-19-0x0000000002A40000-0x0000000002A67000-memory.dmp

                    Filesize

                    156KB

                  • memory/4428-324-0x0000000002A40000-0x0000000002A67000-memory.dmp

                    Filesize

                    156KB