General
-
Target
b99c2748e46c0f8ed8da08fd933e0d9f_JaffaCakes118
-
Size
329KB
-
Sample
240617-x272ys1cla
-
MD5
b99c2748e46c0f8ed8da08fd933e0d9f
-
SHA1
b86e4150446e189259db650270edcc02296b4ca5
-
SHA256
f6045c3d60fb2e0ddbb264cd61adc37736508471aa5b3881f2510ec36ea6c00f
-
SHA512
da239c429c2bc7e24f1a4ad1420d501a29e7abde4b89e474f290b4678d10a571c84b2cddb6994104ec2dc80d260122f3f8289e9113b2d0b54c483f249207167f
-
SSDEEP
3072:OODJbBMEjlrdbFDh2vR5w5HaP6yTEu2edjl5m5ejROBFNI4z8l+xL07HnkuTSG1L:JhF9h2f46P6yIu2hUROX4IAHDO9fs7
Static task
static1
Behavioral task
behavioral1
Sample
b99c2748e46c0f8ed8da08fd933e0d9f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b99c2748e46c0f8ed8da08fd933e0d9f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
b99c2748e46c0f8ed8da08fd933e0d9f_JaffaCakes118
-
Size
329KB
-
MD5
b99c2748e46c0f8ed8da08fd933e0d9f
-
SHA1
b86e4150446e189259db650270edcc02296b4ca5
-
SHA256
f6045c3d60fb2e0ddbb264cd61adc37736508471aa5b3881f2510ec36ea6c00f
-
SHA512
da239c429c2bc7e24f1a4ad1420d501a29e7abde4b89e474f290b4678d10a571c84b2cddb6994104ec2dc80d260122f3f8289e9113b2d0b54c483f249207167f
-
SSDEEP
3072:OODJbBMEjlrdbFDh2vR5w5HaP6yTEu2edjl5m5ejROBFNI4z8l+xL07HnkuTSG1L:JhF9h2f46P6yIu2hUROX4IAHDO9fs7
Score10/10-
Locky (Osiris variant)
Variant of the Locky ransomware seen in the wild since early 2017.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-