Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe
-
Size
590KB
-
MD5
a1cb6b40b49d78103444c32f4f5c1022
-
SHA1
d911951b10b4c41239f639af8397fefbc9deed12
-
SHA256
aa36ae501dd09617500a6b38de7917dc5c7313fffb2841bcfdcafa9d567621f0
-
SHA512
e6b05658f34beff41d7fc13cfb4bd3cff776a24356cce78fb2c29002a4e451a40e019c806c824274fc41248582254320961f07d56b0a4fc38a2fb676045db1e4
-
SSDEEP
12288:/g2xN5Hef7wWHX+IuNEFVqhJuWYI17c8Z7zo1N9:LN5+f7t3cEFVq5Y0wu7zo
Malware Config
Signatures
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\lukitus.bmp" a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\WallpaperStyle = "0" a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Control Panel\Desktop\TileWallpaper = "0" a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB2AF701-28EB-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2876 iexplore.exe 2344 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2604 IEXPLORE.EXE 2604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2876 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 32 PID 2204 wrote to memory of 2876 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 32 PID 2204 wrote to memory of 2876 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 32 PID 2204 wrote to memory of 2876 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 32 PID 2876 wrote to memory of 2604 2876 iexplore.exe 34 PID 2876 wrote to memory of 2604 2876 iexplore.exe 34 PID 2876 wrote to memory of 2604 2876 iexplore.exe 34 PID 2876 wrote to memory of 2604 2876 iexplore.exe 34 PID 2204 wrote to memory of 2824 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 35 PID 2204 wrote to memory of 2824 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 35 PID 2204 wrote to memory of 2824 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 35 PID 2204 wrote to memory of 2824 2204 a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe"1⤵
- Sets desktop wallpaper using registry
- Enumerates system info in registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\lukitus.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\a1cb6b40b49d78103444c32f4f5c1022_JaffaCakes118.exe"2⤵
- Deletes itself
PID:2824
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5b5389b0baea9826fb047ec7c5397dfd6
SHA18402a3abfa0c7baed4c32368a04c3d695e5b192a
SHA2560d71884066f3ef9427c6a39af412a27207d209d682bb325b465804b85168b7ca
SHA5124f0937c2d7c1e37745a0ac15b503adf2212d850862186abe225e09c9860b30f83395f8614ab9f90931d316fbebbe5c742a7c02f33528002315359293331f6253
-
Filesize
8KB
MD53b88ee0b42957ea297b6f69a8b14069a
SHA183474fda0ea83b5d7bd192ef66fe8355d2ced383
SHA256eb47c56cab20d9ac8cf2e5aa1356460f5b221611a74cac22f78c8fabc9c2828c
SHA512d73ada7e6f9816d7db406f46facf89f6608ff3c1b624e542edba4f1ea13a21a1d3d520b3230528290638b6c28d42bc2d1f15fa12b5328a5cf4c74a220a2e209a