Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe
-
Size
364KB
-
MD5
9533202d7c1075d12f1a900cf8c950c5
-
SHA1
cd23d34033b14515a084bc2b4870c11cacde0f15
-
SHA256
2fd6e890d882a29f4cfadc123f8016e584a864aba3c1166dfc0fea4f37a66fd8
-
SHA512
f76108c1014882ea2671cf91755645af6a33f835bae597ecab6d81b02b564501b1380142f5cb8b638ae6751845d930bce69696b13849be88b9676805894071c1
-
SSDEEP
6144:1zGwKmwzQoBnpA2cQJ4R1Y9+sSj22UJre6OmLFrHXvu9dEP8vWy0oB1wO5Vzt4:VKmwzQoBnpAkJ4R1Y9+nrKZJFrH8dvvC
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\DesktopOSIRIS.bmp" 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\WallpaperStyle = "0" 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\TileWallpaper = "0" 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4428 wrote to memory of 3576 4428 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe 107 PID 4428 wrote to memory of 3576 4428 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe 107 PID 4428 wrote to memory of 4260 4428 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe 109 PID 4428 wrote to memory of 4260 4428 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe 109 PID 4428 wrote to memory of 4260 4428 9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\DesktopOSIRIS.htm2⤵PID:3576
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\9533202d7c1075d12f1a900cf8c950c5_JaffaCakes118.exe"2⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4080,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3976 /prefetch:81⤵PID:4188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=1268,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:11⤵PID:872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4984,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:11⤵PID:4476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5308,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5320 /prefetch:81⤵PID:2388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5288,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:81⤵PID:3256
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5716,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5824 /prefetch:81⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e40b80d158474bca5d6b5c52ef57a639
SHA1b625a185b666a9ad747eafd1ba4db1c4dd7c9bf7
SHA256faf2bbaffb61f6e7b0fc6672c16f102bd99cbf1349d18cf0a1dcf3b37d275fbb
SHA5121d82134a88235bf6e502c60048553853e482c73e46049cc42681eafba3a90ad289fa06ffbedbad7fcc9ef6b79724cbd807b4dfbebc44eca0859ff0f172f85d94