General
-
Target
c537ad6b878730ba88834bdb361e3bd7_JaffaCakes118
-
Size
595KB
-
Sample
240827-sdenaawepf
-
MD5
c537ad6b878730ba88834bdb361e3bd7
-
SHA1
f6568b081dd562bcee939c9f691184b37ac10046
-
SHA256
4b6ffe7c8bb710c3b3e7eef0a79dae32ec9c3a4a3684d252caff3f8a33bd8856
-
SHA512
1e3b631f5178084ed49c5d22513c67aa6f8291aeb7a513f5aaeca44c83bd0bd0efb02c0d67b21e8829fe277c1befed01ae5e4bb5dca4befd2a28069e20451f05
-
SSDEEP
12288:/mDxN5Hef7wWHX+IuNEFVqhJuWYI17c8Z7zo1N92:YN5+f7t3cEFVq5Y0wu7zoI
Static task
static1
Behavioral task
behavioral1
Sample
c537ad6b878730ba88834bdb361e3bd7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c537ad6b878730ba88834bdb361e3bd7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
c537ad6b878730ba88834bdb361e3bd7_JaffaCakes118
-
Size
595KB
-
MD5
c537ad6b878730ba88834bdb361e3bd7
-
SHA1
f6568b081dd562bcee939c9f691184b37ac10046
-
SHA256
4b6ffe7c8bb710c3b3e7eef0a79dae32ec9c3a4a3684d252caff3f8a33bd8856
-
SHA512
1e3b631f5178084ed49c5d22513c67aa6f8291aeb7a513f5aaeca44c83bd0bd0efb02c0d67b21e8829fe277c1befed01ae5e4bb5dca4befd2a28069e20451f05
-
SSDEEP
12288:/mDxN5Hef7wWHX+IuNEFVqhJuWYI17c8Z7zo1N92:YN5+f7t3cEFVq5Y0wu7zoI
-
Locky (Lukitus variant)
Variant of the Locky ransomware seen in the wild since late 2017.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Deletes itself
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3